A Novel Approach for Image Steganography Using Dynamic Substitution and Secret Key
暂无分享,去创建一个
[1] Mohammed Abbas Fadhil Al-Husainy. Message Segmentation to Enhance the Security of LSB Image Steganography , 2012 .
[2] N. Hamid,et al. Image Steganography Techniques : An Overview , 2012 .
[3] Dinesh Garg,et al. A New Purposed Issue for Secure Image Steganography Technique Based On 2-D Block DCT and DCT , 2012 .
[4] N. Santoshi,et al. A Secure and Lossless Adaptive Image Steganography with Mod-4 LSB Replacement Methods Using Image Contrast , 2012 .
[5] Min-Shiang Hwang,et al. Steganography Based on Payload Transformation , 2011 .
[6] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[7] Meenu Kumari,et al. JPEG Compression Steganography & Crypography Using Image-Adaptation Technique , 2010 .
[8] C. Stanley,et al. Pairs of Values and the Chi-squared Attack , 2005 .
[9] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[10] Bin Li,et al. A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..
[11] Ching-Nung Yang,et al. Steganography and authentication in image sharing without parity bits , 2012 .
[12] Atallah M. Al-Shatnawi. A New Method in Image Steganography with Improved Image Quality , 2012 .
[13] Cheng-Hsing Yang,et al. Inverted pattern approach to improve image quality of information hiding by LSB substitution , 2008, Pattern Recognit..
[14] Huaiqing Wang,et al. Cyber warfare: steganography vs. steganalysis , 2004, CACM.
[15] Suman goyat,et al. A Novel Technique Used For Image Steganography Based On Frequency Domain , 2012 .
[16] Aarti Kochhar,et al. Transform Domain Analysis of Image Steganography , 2013 .
[17] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[18] Nasir D. Memon,et al. Performance study of common image steganography and steganalysis techniques , 2006, J. Electronic Imaging.
[19] R. Akila,et al. A Comparative Analysis of Image Steganography , 2010 .
[20] Ramanpreet Kaur,et al. A Comparative Study of Combination of Different Bit Positions , 2012 .
[21] Saurabh Singh,et al. Use of image to secure text message with the help of LSB replacement , 2010 .
[22] Ki-Ryong Kwon,et al. An Image Steganography Using Pixel Characteristics , 2005, CIS.
[23] Sarbjeet Singh,et al. A Proposed Method for Image Steganography Using Edge Detection , 2013 .
[24] Jagvinder Kaur,et al. Study and Analysis of Various Image Steganography Techniques , .
[25] S. Ramakrishnan,et al. An Improved Steganographic Technique Using LSB Replacement on a Scanned Path Image , 2014, Int. J. Netw. Secur..
[26] C. Nagaraju,et al. A NOVEL INFORMATION HIDING TECHNIQUE FOR SECURITY BY USING IMAGE STEGANOGRAPHY , 2009 .
[27] Alisha Arora,et al. IMAGE STEGANOGRAPHY TECHNIQUES: AN OVERVIEW , 2014 .
[28] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[29] Kevin Curran,et al. Biometric Inspired Digital Image Steganography , 2008, 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ecbs 2008).
[30] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[31] Nitin Jain,et al. Image Steganography Using LSB and Edge - Detection Technique , 2012 .
[32] Namita Tiwari,et al. Evaluation of Various LSB based Methods of Image Steganography on GIF File Format , 2010 .
[33] G. Sravanthi,et al. A S patial Domain Image Steganography Technique Based on Plane Bit Substitution Method , 2012 .
[34] Nidhi. Image steganography using least significant bit with cryptography , 2015 .
[35] Yuji Iwahori,et al. Application Of Fuzzy Theory To Writer Recognition Of Chinese Characters , 1998 .
[36] J. Shanbehzadeh,et al. High Capacity Image Steganography usingWavelet Transform and Genetic Algorithm , 2011 .