An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method
暂无分享,去创建一个
[1] Xinpeng Zhang,et al. Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.
[2] Cheng-Hsing Yang,et al. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.
[3] M. Hwang,et al. (IEE Proceedings Vision, Image and Signal Processing, 152(5):611-615)Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement , 2005 .
[4] Karim Faez,et al. Image Hiding by Using Genetic Algorithm and LSB Substitution , 2010, ICISP.
[5] Thierry Pun,et al. Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..
[6] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[7] Chin-Chen Chang,et al. High payload steganography mechanism using hybrid edge detector , 2010, Expert Syst. Appl..
[8] Tao Zhang,et al. A fast and effective steganalytic technique against JSteg-like algorithms , 2003, SAC '03.
[9] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[10] Punam Bedi,et al. Using PSO in a spatial domain based image hiding scheme with distortion tolerance , 2013, Comput. Electr. Eng..
[11] Tao Zhang,et al. Detection of LSB matching steganography based on distribution of pixel differences in natural images , 2010, 2010 International Conference on Image Analysis and Signal Processing.
[12] Iuon-Chang Lin,et al. Hiding data in spatial domain images with distortion tolerance , 2009, Comput. Stand. Interfaces.
[13] Chin-Chen Chang,et al. A steganographic method for digital images using side match , 2004, Pattern Recognit. Lett..
[14] Anindya Sarkar,et al. Further study on YASS: steganography based on randomized embedding to resist blind steganalysis , 2008, Electronic Imaging.
[15] Shiuh-Jeng Wang,et al. Steganography of capacity required using modulo operator for embedding secret image , 2005, Appl. Math. Comput..
[16] Jessica J. Fridrich,et al. Perturbed quantization steganography , 2005, Multimedia Systems.
[17] Pradeep M. Patil,et al. Robust and secured image-adaptive data hiding , 2012, Digit. Signal Process..
[18] Nameer N. El-Emam,et al. New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm , 2013, J. Syst. Softw..
[20] S. Mazloom,et al. Color image encryption based on Coupled Nonlinear Chaotic Map , 2009 .
[21] Anindya Sarkar,et al. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.
[22] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[23] D. E. Goldberg,et al. Genetic Algorithms in Search , 1989 .
[24] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[25] Mamta Juneja,et al. Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.
[26] C.-C. Jay Kuo,et al. Steganography in JPEG2000 compressed images , 2003, IEEE Trans. Consumer Electron..
[27] Ja-Chen Lin,et al. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..
[28] Punam Bedi,et al. Using PSO in Image Hiding Scheme Based on LSB Substitution , 2011, ACC.
[29] Jessica J. Fridrich,et al. Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..
[30] Yen-Ping Chu,et al. A Novel Image Data Hiding Scheme with Diamond Encoding , 2009, EURASIP J. Inf. Secur..
[31] Der-Chyuan Lou,et al. A novel adaptive steganography based on local complexity and human vision sensitivity , 2010, J. Syst. Softw..
[32] Taejeong Kim,et al. Side match and overlap match vector quantizers for images , 1992, IEEE Trans. Image Process..
[33] Min-Shiang Hwang,et al. A high quality steganographic method with pixel-value differencing and modulus function , 2008, J. Syst. Softw..
[34] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[35] George Stephanides,et al. A novel technique for image steganography based on a high payload method and edge detection , 2012, Expert Syst. Appl..
[36] Hideki Noda,et al. BPCS steganography using EZW lossy compressed images , 2002, Pattern Recognit. Lett..
[37] Qiaoyan Wen,et al. A steganographic method for digital images with four-pixel differencing and modified LSB substitution , 2011, J. Vis. Commun. Image Represent..
[38] Jessica J. Fridrich,et al. Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.
[39] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[40] Bin Li,et al. A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..
[41] James Kennedy,et al. Particle swarm optimization , 2002, Proceedings of ICNN'95 - International Conference on Neural Networks.
[42] Chin-Chen Chang,et al. A steganographic scheme by fully exploiting modification directions , 2011, Expert Syst. Appl..
[43] Liang Zhang,et al. A High-Capacity Steganography Scheme for JPEG2000 Baseline System , 2009, IEEE Transactions on Image Processing.
[44] Punam Bedi,et al. Best Hiding Capacity Scheme for Variable Length Messages Using Particle Swarm Optimization , 2010, SEMCCO.
[45] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[46] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..
[47] Chin-Chen Chang,et al. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..
[48] Chin-Chen Chang,et al. A high stego-image quality steganographic scheme with reversibility and high payload using multiple embedding strategy , 2009, J. Syst. Softw..
[49] Cheng-Hsing Yang,et al. Varied PVD + LSB evading detection programs to spatial domain in data embedding systems , 2010, J. Syst. Softw..
[50] B. S. Manjunath,et al. Robust image-adaptive data hiding using erasure and error correction , 2004, IEEE Transactions on Image Processing.
[51] Thierry Pun,et al. A Stochastic Approach to Content Adaptive Digital Image Watermarking , 1999, Information Hiding.
[52] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[53] Harold Joseph Highland,et al. Data encryption: A non-mathematical approach , 1997, Comput. Secur..
[54] Nameer N. El-Emam. Hiding a Large Amount of Data with High Security Using Steganography Algorithm , 2007 .
[55] Mohamed A. Bamatraf,et al. Data Hiding by LSB Substitution Using Genetic Optimal Key-Permutation , 2011, Int. Arab. J. e Technol..
[56] Tung-Shou Chen,et al. Data embedding using pixel value differencing and diamond encoding with multiple-base notational system , 2012, J. Syst. Softw..