Efficient and secure data hiding in encrypted images: A new approach using chaos
暂无分享,去创建一个
[1] Chin-Chen Chang,et al. A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..
[2] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[3] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[4] Qiang Cheng,et al. Multimedia watermarking , 2002 .
[5] Sengül Dogan,et al. A new data hiding method based on chaos embedded genetic algorithm for color image , 2016, Artificial Intelligence Review.
[6] Kousik Dasgupta,et al. A Novel Secure Image Steganography Method Based on Chaos Theory in Spatial Domain , 2014 .
[7] Rajeev Kumar,et al. A NEW CHAOTIC IMAGE ENCRYPTION USING PARAMETRIC SWITCHING BASED PERMUTATION AND DIFFUSION , 2014 .
[8] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[9] K. Murali,et al. Chaos based spread spectrum image steganography , 2004, IEEE Transactions on Consumer Electronics.
[10] Ki-Hyun Jung,et al. Data hiding method using image interpolation , 2009, Comput. Stand. Interfaces.
[11] J. Krenn,et al. Steganography and Steganalysis , 2006 .
[12] Frank Bossen,et al. Digital watermarking of color images using amplitude modulation , 1998, J. Electronic Imaging.
[13] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[14] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[15] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[16] Jian Zhao,et al. Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.
[17] Merrill Warkentin,et al. Steganography and Steganalysis , 2006 .
[18] Ahmed H. Tewfik,et al. Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.
[19] Azizah Abdul Manaf,et al. High watermarking capacity based on spatial domain technique , 2011 .
[20] Martin F. H. Schuurmans,et al. Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.
[21] Saraju P. Mohanty,et al. Hardware assisted watermarking for multimedia , 2009, Comput. Electr. Eng..
[22] Javaid A. Sheikh,et al. Data hiding in intermediate significant bit planes, a high capacity blind steganographic technique , 2012, 2012 International Conference on Emerging Trends in Science, Engineering and Technology (INCOSET).
[23] Ghada Th. Talee,et al. A New Approach For Chaotic Encrypted Data Hiding In Color Image , 2014 .
[24] Raoof Smko,et al. Variable length encoding in multiple frequency domain steganography , 2010, 2010 2nd International Conference on Software Technology and Engineering.
[25] Javaid A. Sheikh,et al. Data hiding in scrambled images: A new double layer security data hiding technique , 2014, Comput. Electr. Eng..
[27] Christos H. Skiadas,et al. Chaos theory : modeling, simulation and applications : selected papers from the 3rd Chaotic Modeling and Simulation Conference (CHAOS2010), Chania, Crete, Greece, 1-4 June 2010 , 2011 .
[28] Jan H. P. Eloff,et al. An overview of image steganography , 2005, ISSA.
[29] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[30] S Pradeep,et al. A NEW ONE ROUND IMAGE ENCRYPTION ALGORITHM BASED ON MULTIPLE CHAOTIC SYSTEMS , 2015 .
[31] Melad J. Saeed,et al. A NEW TECHNIQUE BASED ON CHAOTIC STEGANOGRAPHY AND ENCRYPTION TEXT IN DCT DOMAIN FOR COLOR IMAGE , 2013 .
[32] Trista Pei-chun Chen. On the Study of Watermarking Application in WWW --- Modeling, Performance Analysis, and Applicati , 1999 .