Secured Image Transmission Using a Novel Neural Network Approach and Secret Image Sharing Technique
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain , 2005, IS&T/SPIE Electronic Imaging.
[2] Xingang You,et al. Steganalysis of Palette Images: Attack Optimal Parity Assignment Algorithm , 2005, 2005 5th International Conference on Information Communications & Signal Processing.
[3] D. Artz,et al. Digital steganography: hiding data within data , 2001 .
[4] Der-Chyuan Lou,et al. Steganographic Method for Secure Communications , 2002, Comput. Secur..
[5] Chin-Chen Chang,et al. New image steganographic methods using run-length approach , 2006, Inf. Sci..
[6] Sushil Jajodia,et al. Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).
[7] Bin Li,et al. A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..
[8] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[9] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[10] S.B. Sadkhan. Cryptography : current status and future trends , 2004, Proceedings. 2004 International Conference on Information and Communication Technologies: From Theory to Applications, 2004..
[11] S. Han,et al. Fingerprinted secret sharing steganography for robustness against image cropping attacks , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..
[12] Ming Yang,et al. Applied image processing to multimedia information security , 2009, 2009 International Conference on Image Analysis and Signal Processing.
[13] Ran-Zan Wang,et al. Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..
[14] Tao Zhang,et al. Improved LSB matching steganography resisting histogram attacks , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[15] Wen Gao,et al. Steganalysis of data hiding techniques in wavelet domain , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[16] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[17] Kshetrimayum Jenita Devi. A Secure Image Steganography Using LSB Technique and Random Pseudo Random Encoding Technique , 2013 .
[18] Xuan Hou,et al. Research of model of Quantum Learning Vector Quantization Neural Network , 2011, Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology.
[19] Philip H. Goodman,et al. Comparing artificial neural networks to other statistical methods for medical outcome prediction , 1994, Proceedings of 1994 IEEE International Conference on Neural Networks (ICNN'94).
[20] Tariq Jamil. Steganography: the art of hiding information in plain sight , 1999 .
[21] Chin-Chen Chang,et al. A new (t, n) threshold image hiding scheme for sharing a secret color image , 2003, International Conference on Communication Technology Proceedings, 2003. ICCT 2003..
[22] Adi Shamir,et al. How to share a secret , 1979, CACM.
[23] Chin-Chen Chang,et al. Sharing Secret Omages using Shadow Codebooks , 1998, Inf. Sci..
[24] K.B. Raja,et al. A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.
[25] Ja-Chen Lin,et al. An image-sharing method with user-friendly shadow images , 2003, IEEE Trans. Circuits Syst. Video Technol..
[26] Yu-Chen Hu,et al. Reversible image hiding scheme using predictive coding and histogram shifting , 2009, Signal Process..
[27] Andrew Knight. Basics of MATLAB and Beyond , 1999 .
[28] Chin-Chen Chang,et al. Sharing secrets in stego images with authentication , 2008, Pattern Recognit..
[29] Huaying Dong,et al. Study on Characteristic of Fractional Master-Slave Neural Network , 2012, 2012 Fifth International Symposium on Computational Intelligence and Design.
[30] Ching-Nung Yang,et al. Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..
[31] Xian-Ting Zeng,et al. Lossless Data Hiding Scheme Based on Adjacent Pixel Difference , 2009, 2009 International Conference on Computer Engineering and Technology.
[32] Chin-Chen Chang,et al. A novel secret image sharing scheme in color images using small shadow images , 2008, Inf. Sci..
[33] Rathi Kannan Munukur,et al. Neural network based decryption for random encryption algorithms , 2009, 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication.
[34] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[35] Ning Ma,et al. Two secret sharing schemes based on Boolean operations , 2007, Pattern Recognit..
[36] Ingemar J. Cox,et al. A comparative study of ± steganalyzers , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.
[37] Rastislav Lukac,et al. Digital image indexing using secret sharing schemes: a unified framework for single-sensor consumer electronics , 2005, IEEE Transactions on Consumer Electronics.
[38] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[39] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[40] Jui-Cheng Yen,et al. Design and realization of a new chaotic neural encryption/decryption network , 2000, IEEE APCCAS 2000. 2000 IEEE Asia-Pacific Conference on Circuits and Systems. Electronic Communication Systems. (Cat. No.00EX394).
[41] Mark Owens March,et al. A Discussion of Covert Channels and Steganography , 2002 .
[42] Khalil Shihab,et al. A Backpropagation Neural Network for Computer Network Security , 2006 .
[43] Kun Chang Lee,et al. Hybrid neural network-driven reasoning approach to bankruptcy prediction: comparison with MDA, ACLS, and neural network , 1994, Proceedings of 1994 IEEE International Conference on Neural Networks (ICNN'94).
[44] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[45] L.C. De Silva,et al. Application of MultiLayer Perceptron Network as a one-way hash function , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[46] Ja-Chen Lin,et al. Sharing and hiding secret images with size constraint , 2004, Pattern Recognit..
[47] Shou-wei Li. Analysis of Contrasting Neural Network with Small-World Network , 2008, 2008 International Seminar on Future Information Technology and Management Engineering.
[48] Chin-Chen Chang,et al. Secret Image Hiding and Sharing Based on the (t, n)-Threshold , 2007, Fundam. Informaticae.
[49] Jen-Bang Feng,et al. A new multi-secret images sharing scheme using Largrange's interpolation , 2005, J. Syst. Softw..
[50] T. Kondo. Feedback GMDH-type neural network using prediction error criterion and its application to 3-dimensional medical image recognition , 2008, 2008 SICE Annual Conference.
[51] Chang-Chou Lin,et al. Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..
[52] Edward J. Delp,et al. A Review of Data Hiding in Digital Images , 1999, PICS.
[53] Pei-Yu Lin,et al. Invertible secret image sharing with steganography , 2010, Pattern Recognit. Lett..
[54] Ki-Hyun Jung,et al. Data hiding method using image interpolation , 2009, Comput. Stand. Interfaces.
[55] Herbert J. Mattord,et al. Principles of Information Security , 2004 .
[56] Huaiqing Wang,et al. Cyber warfare: steganography vs. steganalysis , 2004, CACM.
[57] Ran-Zan Wang,et al. Improved Invertible Secret Image Sharing with Steganography , 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.