Hiding in encrypted images: a three tier security data hiding technique
暂无分享,去创建一个
Javaid A. Sheikh | Shabir A. Parah | Ghulam Mohiuddin Bhat | G. M. Bhat | Umer I. Assad | S. A. Parah | J. Sheikh | U. I. Assad
[1] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[2] Xiaolong Li,et al. A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding , 2014, Signal Process..
[3] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[4] Hyoung Joong Kim,et al. Near-optimal solution to pair-wise LSB matching via an immune programming strategy , 2010, Inf. Sci..
[5] Abid Yahya,et al. Secured and robust information hiding scheme , 2013 .
[6] Javaid Ahmad,et al. Field programmable gate array (FPGA) implementation of novel complex PN-code-generator- based data scrambler and descrambler , 2010 .
[7] Reza Azarderakhsh,et al. Efficient Algorithm and Architecture for Elliptic Curve Cryptography for Extremely Constrained Secure Applications , 2014, IEEE Transactions on Circuits and Systems I: Regular Papers.
[8] Ingemar J. Cox,et al. Applying informed coding and embedding to design a robust high-capacity watermark , 2004, IEEE Transactions on Image Processing.
[9] Amitesh Singh Rajput,et al. Towards the growth of image encryption and authentication schemes , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[10] Jeho Nam,et al. A Novel Difference Expansion Transform for Reversible Data Embedding , 2008, IEEE Transactions on Information Forensics and Security.
[11] Shabir A. Parah,et al. A secure and robust information hiding technique for covert communication , 2015 .
[12] KokSheik Wong,et al. Universal data embedding in encrypted domain , 2014, Signal Process..
[13] Jessica J. Fridrich,et al. Higher-order statistical steganalysis of palette images , 2003, IS&T/SPIE Electronic Imaging.
[14] Wu-Lin Chen,et al. High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding , 2015, Signal Process..
[15] Zhenxing Qian,et al. Efficient reversible data hiding in encrypted images , 2014, J. Vis. Commun. Image Represent..
[16] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[17] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..
[18] Andrew D. Ker. Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.
[19] Javaid A. Sheikh,et al. Data hiding in intermediate significant bit planes, a high capacity blind steganographic technique , 2012, 2012 International Conference on Emerging Trends in Science, Engineering and Technology (INCOSET).
[20] Min-Shiang Hwang,et al. Data Hiding: Current Status and Key Issues , 2007, Int. J. Netw. Secur..
[21] Julio César Hernández Castro,et al. A framework for avoiding steganography usage over HTTP , 2012, J. Netw. Comput. Appl..
[22] Azizah Abdul Manaf,et al. High watermarking capacity based on spatial domain technique , 2011 .
[23] Chun-Shien Lu,et al. Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property , 2004 .
[24] Ercan Solak. Passion of chaotic cryptography , 2013, 2013 21st Signal Processing and Communications Applications Conference (SIU).