Perceptual threshold in DWT for optimum embedding rate in data hiding using HVS and GA
暂无分享,去创建一个
[1] D. Artz,et al. Digital steganography: hiding data within data , 2001 .
[2] Q. Gu,et al. Reversible watermarking algorithm based on wavelet lifting scheme , 2007, 2007 International Conference on Wavelet Analysis and Pattern Recognition.
[3] Kefa Rabah,et al. Steganography-The Art of Hiding Data , 2004 .
[4] Zenon Chaczko,et al. Hyper Edge Detection with Clustering for Data Hiding , 2016, J. Inf. Hiding Multim. Signal Process..
[5] Jamshid Shanbehzadeh,et al. High Capacity Image Steganography Based on Genetic Algorithm and Wavelet Transform , 2012 .
[6] Ajith Abraham,et al. Significance of steganography on data security , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[7] Wen-Nung Lie,et al. Data hiding in images with adaptive numbers of least significant bits based on the human visual system , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[8] Shen Wang,et al. A Secure Steganography Method based on Genetic Algorithm , 2010, J. Inf. Hiding Multim. Signal Process..
[9] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[10] Zengqiang Chen,et al. A Novel Adaptive Reversible Watermarking Algorithm Based on Wavelet Lifting Scheme , 2009, 2009 International Conference on Information Engineering and Computer Science.
[11] Kee-Young Yoo,et al. A New Image Steganography Based on 2k Correction and Edge-Detection , 2008, Fifth International Conference on Information Technology: New Generations (itng 2008).
[12] Ronak Karimi,et al. Steganography in Image Segments Using Genetic Algorithm , 2015, 2015 Fifth International Conference on Advanced Computing & Communication Technologies.
[13] Huaiqing Wang,et al. Cyber warfare: steganography vs. steganalysis , 2004, CACM.
[14] Zenon Chaczko,et al. Digital multimedia archiving based on optimization steganography system , 2014, 2014 Asia-Pacific Conference on Computer Aided System Engineering (APCASE).
[15] Nikolay N. Ponomarenko,et al. A NEW FULL-REFERENCE QUALITY METRICS BASED ON HVS , 2006 .
[16] Eric Cole,et al. Hiding in Plain Sight: Steganography and the Art of Covert Communication , 2003 .
[17] Jun Li,et al. Steganography based on Minimizing Embedding Impact function and HVS , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).