A Review on Image Steganography Techniques
暂无分享,去创建一个
[1] T. Vigneswaran,et al. Steganographic Method Image Security Based on Optimal Pixel Adjustment Process and Integer Wavelet Transform , 2013 .
[2] Manoj Kumar Ramaiya,et al. Security improvisation in image steganography using DES , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).
[3] Robert X. Gao,et al. Discrete Wavelet Transform , 2011 .
[4] Sunny Dagar,et al. Highly randomized image steganography using secret keys , 2014, International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014).
[5] M. Jamzad,et al. A robust steganography algorithm based on texture similarity using Gabor filter , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..
[6] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[7] A. Nag,et al. An image steganography technique using X-box mapping , 2012, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012).
[8] Khalid A. Darabkh,et al. An improved image least significant bit replacement method , 2014, 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[9] R. Bhavani,et al. A modified secure digital image steganography based on Discrete Wavelet Transform , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).
[10] Reena M. Patel,et al. Multiple LSB data hiding based on pixel value and MSB value , 2013, 2013 Nirma University International Conference on Engineering (NUiCONE).
[11] 中野 和司,et al. Discrete Fourier Transform(DFT)の数値解析とその応用 , 1990 .
[12] Tanima Dutta,et al. Least significant bit matching steganalysis based on feature analysis , 2013, 2013 National Conference on Communications (NCC).
[13] D. Agrawal,et al. Random image steganography in spatial domain , 2013, 2013 International Conference on Emerging Trends in VLSI, Embedded System, Nano Electronics and Telecommunication System (ICEVENT).
[14] D.R. Denslin Brabin,et al. QET based steganography technique for JPEG images , 2009, 2009 International Conference on Control, Automation, Communication and Energy Conservation.
[15] Ashish Chawla,et al. A Modified Secure Digital Image Steganography Based on Dwt Using Matrix Rotation Method , 2013 .
[16] Yilong Yin,et al. SAR image segmentation based on Artificial Bee Colony algorithm , 2011, Appl. Soft Comput..
[17] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[18] El-Sayed M. El-Alfy. Detecting pixel-value differencing steganography using Levenberg-Marquardt neural network , 2013, 2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM).
[19] Mohit Garg,et al. A Novel Text Steganography Technique Based on Html Documents , 2011 .
[20] Jan H. P. Eloff,et al. An overview of image steganography , 2005, ISSA.
[21] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[22] Emil Slusanschi,et al. Data Hiding Using Steganography , 2013, 2013 IEEE 12th International Symposium on Parallel and Distributed Computing.