Genetic Algorithm Based Steganography Using Wavelets
暂无分享,去创建一个
K. R. Venugopal | Lalit M. Patnaik | K. B. Raja | K. KiranKumar | N. SatishKumar | M. S. Lakshmi | H. Preeti | K. Venugopal | L. Patnaik | K. Raja | K. Kirankumar | N. SatishKumar | M. Lakshmi | H. Preeti
[1] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[2] M.-R. Akbarzadeh-T,et al. A New Genetic Algorithm Approach for Secure JPEG Steganography , 2006, 2006 IEEE International Conference on Engineering of Intelligent Systems.
[3] Xingang You,et al. A DCT-based image steganographic method resisting statistical attacks , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[4] Rongrong Ji,et al. Genetic Algorithm Based Optimal Block Mapping Method for LSB Substitution , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.
[5] B. S. Manjunath,et al. Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration , 2006, 2006 International Conference on Image Processing.
[6] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[7] Rajarathnam Chandramouli. Data hiding capacity in the presence of an imperfectly known channel , 2001, IS&T/SPIE Electronic Imaging.
[8] Andrew H. Sung,et al. Defeating the current steganalysis techniques (robust steganography) , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[9] Phil Sallee,et al. Model-Based Methods For Steganography And Steganalysis , 2005, Int. J. Image Graph..
[10] Alessandro Neri,et al. Compressive Data Hiding: An Unconventional Approach for Improved Color Image Coding , 2002, EURASIP J. Adv. Signal Process..
[11] Z. Qiu,et al. A DWT-based color image steganography scheme , 2002, 6th International Conference on Signal Processing, 2002..
[12] Chin-Chen Chang,et al. An effective image steganographic scheme based on wavelet transformation and pattern-based modification , 2003, 2003 International Conference on Computer Networks and Mobile Computing, 2003. ICCNMC 2003..
[13] Frank Y. Shih,et al. Genetic algorithm based methodology for breaking the steganalytic systems , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[14] S. Luke,et al. A Comparison of Crossover and Mutation in Genetic Programming , 1997 .