Developing a Secure Image Steganographic System Using TPVD Adaptive LSB Matching Revisited Algorithm for Maximizing the Embedding Rate
暂无分享,去创建一个
[1] Jiri Fridrich,et al. Applications of data hiding in digital images , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).
[2] Martin F. H. Schuurmans,et al. Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.
[3] Jan H. P. Eloff,et al. An overview of image steganography , 2005, ISSA.
[4] Tomás Pevný,et al. Multiclass Detector of Current Steganographic Methods for JPEG Format , 2008, IEEE Transactions on Information Forensics and Security.
[5] Ahmed H. Tewfik,et al. Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.
[6] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[7] Bin Li,et al. Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels , 2007, 2007 IEEE International Conference on Image Processing.
[8] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[9] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[10] T. Rabie. High-capacity steganography , 2013, 2013 6th International Congress on Image and Signal Processing (CISP).
[11] John Langford,et al. Provably Secure Steganography , 2002, IEEE Transactions on Computers.
[12] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[13] Sushil Jajodia,et al. Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.
[14] Liang Zhang,et al. A High-Capacity Steganography Scheme for JPEG2000 Baseline System , 2009, IEEE Transactions on Image Processing.
[15] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[16] Hannes Federrath,et al. Modeling the Security of Steganographic Systems , 1998, Information Hiding.
[17] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[18] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[19] Andrew D. Ker. Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.
[20] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[21] Kathryn Hempstalk,et al. Hiding Behind Corners : Using Edges in Images for Better Steganography , 2006 .