IoTSteg: ensuring privacy and authenticity in internet of things networks using weighted pixels classification based image steganography
暂无分享,去创建一个
Majdi Rawashdeh | Nedal Ababneh | Alaa Alarood | Mahmoud Al-Khasawneh | Mohammad Al-Omari | M. Al-Khasawneh | N. Ababneh | Majdi Rawashdeh | Mohammad Al-Omari | A. Alarood
[1] Jessica J. Fridrich,et al. Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.
[2] Lewis Tseng,et al. Blockchain-based database in an IoT environment: challenges, opportunities, and analysis , 2020, Cluster Computing.
[3] Stephen Marshall,et al. A New Cost Function for Spatial Image Steganography Based on 2D-SSA and WMF , 2021, IEEE Access.
[4] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[5] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[6] Maoguo Gong,et al. SAR Image Despeckling Based on Local Homogeneous-Region Segmentation by Using Pixel-Relativity Measurement , 2011, IEEE Transactions on Geoscience and Remote Sensing.
[7] Ahmed Farouk,et al. Secure Medical Data Transmission Model for IoT-Based Healthcare Systems , 2018, IEEE Access.
[8] Joanne Hwan Jie Yin,et al. Internet of Things: Securing Data Using Image Steganography , 2015, 2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS).
[9] Mansoor Fateh,et al. A New Method of Coding for Steganography Based on LSB Matching Revisited , 2021, Secur. Commun. Networks.
[10] Ahmed Ghoneim,et al. Secure Quantum Steganography Protocol for Fog Cloud Internet of Things , 2018, IEEE Access.
[11] Ali Ismail Awad,et al. A Novel Image Steganography Method for Industrial Internet of Things Security , 2021, IEEE Transactions on Industrial Informatics.
[12] Bin Ma,et al. Reversible data hiding: Advances in the past two decades , 2016, IEEE Access.
[13] Wei Hao,et al. Reversible Natural Language Watermarking Using Synonym Substitution and Arithmetic Coding , 2018 .
[14] Mostafa Bellafkih,et al. Novel QoE monitoring and management architecture with eTOM for SDN-based 5G networks , 2019, Cluster Computing.
[15] Balachandra Pattanaik,et al. Contrasting the performance metrics of discrete transformations on digital image steganography using artificial intelligence , 2021 .
[16] Gautam Srivastava,et al. Privacy-Preserving Multiobjective Sanitization Model in 6G IoT Environments , 2021, IEEE Internet of Things Journal.
[17] Ayman Ibaida,et al. IoTSign: Protecting Privacy and Authenticity of IoT using Discrete Cosine Based Steganography , 2019, ArXiv.
[18] Paolo Bellavista,et al. A privacy-preserving cryptosystem for IoT E-healthcare , 2020, Inf. Sci..
[19] Q. M. Jonathan Wu,et al. Coverless image steganography using partial-duplicate image retrieval , 2018, Soft Computing.
[20] Xiangyang Luo,et al. A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients , 2020, J. Ambient Intell. Humaniz. Comput..
[21] Zhangjie Fu,et al. Image Steganography Based on Foreground Object Generation by Generative Adversarial Networks in Mobile Edge Computing With Internet of Things , 2019, IEEE Access.
[22] Abhishek Das,et al. Multi-Image Steganography Using Deep Neural Networks , 2021, ArXiv.
[23] David A. Clausi,et al. Comparison and fusion of co‐occurrence, Gabor and MRF texture features for classification of SAR sea‐ice imagery , 2001 .
[24] Li Li,et al. Distortion less secret image sharing scheme for Internet of Things system , 2017, Cluster Computing.
[25] Zhenxing Qian,et al. On Improving Distortion Functions for JPEG Steganography , 2018, IEEE Access.
[26] Sing Bing Kang,et al. Stereo for Image-Based Rendering using Image Over-Segmentation , 2007, International Journal of Computer Vision.
[27] A. Lopes,et al. A statistical and geometrical edge detector for SAR images , 1988 .
[28] Xinpeng Zhang,et al. Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition , 2018, IEEE Access.
[29] Xingming Sun,et al. Coverless Information Hiding Based on the Molecular Structure Images of Material , 2018 .
[30] Licheng Jiao,et al. Bag-of-Visual-Words Based on Clonal Selection Algorithm for SAR Image Classification , 2011, IEEE Geoscience and Remote Sensing Letters.
[31] Pragya Gupta,et al. Image Steganography Using LSB Substitution Facilitated by Shared Password , 2019 .
[32] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[33] Xinpeng Zhang,et al. Towards Robust Image Steganography , 2019, IEEE Transactions on Circuits and Systems for Video Technology.
[34] Peter James Vial,et al. Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research , 2019, Neurocomputing.
[35] Liang Hu,et al. A Reversible Steganography Method With Statistical Features Maintained Based on the Difference Value , 2020, IEEE Access.
[36] R. S. Bichkar,et al. A Secure Spatial Domain Image Steganography Using Genetic Algorithm and Linear Congruential Generator , 2018 .
[37] Keping Yu,et al. Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV , 2020, IEEE Transactions on Vehicular Technology.