An optimized data hiding scheme for Deflate codes
暂无分享,去创建一个
[1] Yu-an Tan,et al. An Effective RAID Data Layout for Object-Based De-duplication Backup System , 2016 .
[2] Chin-Chen Chang,et al. A method of extracting embedded binary data from JPEG bitstreams using standard JPEG decoder , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[3] Jing-Ming Guo,et al. High Capacity Data Hiding for Error-Diffused Block Truncation Coding , 2012, IEEE Transactions on Image Processing.
[4] A. Nikolaidis,et al. Reversible data hiding in JPEG images utilising zero quantised coefficients , 2015, IET Image Process..
[5] Arvind Kumar,et al. Steganography- A Data Hiding Technique , 2010 .
[6] Wen-Hsiang Tsai,et al. A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique , 2007, IEEE Transactions on Information Forensics and Security.
[7] K.C. Navada,et al. Determination of Sequences Responsible for Generation of a Sequence , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).
[8] Hossein L. Najafi. A neural network approach to audio data hiding based on perceptual masking model of the human auditory system , 2007 .
[9] Byeungwoo Jeon,et al. DH-LZW: lossless data hiding in LZW compression , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[10] Weiming Zhang,et al. Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression , 2013, IEEE Transactions on Image Processing.
[11] Jian Li,et al. The Security Analysis of Quantum SAGR04 Protocol in Collective-Rotation Noise Channel ∗ , 2015 .
[12] Chien-Ping Chang,et al. High-payload image hiding with quality recovery using tri-way pixel-value differencing , 2012, Inf. Sci..
[13] Jing-Ming Guo,et al. Reversible data hiding in low complexity and high quality compression scheme , 2012, Digit. Signal Process..
[14] Pradeep M. Patil,et al. Robust and secured image-adaptive data hiding , 2012, Digit. Signal Process..
[15] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[16] Yu-an Tan,et al. A methodology for determining the image base of ARM-based industrial control system firmware , 2017, Int. J. Crit. Infrastructure Prot..
[17] Yuanzhang Li,et al. Determining image base of firmware for ARM devices by matching literal pools , 2016, Digit. Investig..
[18] A. Murat Tekalp,et al. Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.
[19] Chin-Chen Chang,et al. High-Capacity Reversible Data-Hiding for LZW Codes , 2010, 2010 Second International Conference on Computer Modeling and Simulation.
[20] Shabir A. Parah,et al. A secure and robust information hiding technique for covert communication , 2015 .
[21] Can Zhang,et al. Cryptographic key protection against FROST for mobile devices , 2016, Cluster Computing.
[22] Fei Wu,et al. Determining Image Base of Firmware Files for ARM Devices , 2016, IEICE Trans. Inf. Syst..
[23] Chin-Chen Chang,et al. A high-performance reversible data-hiding scheme for LZW codes , 2013, J. Syst. Softw..
[24] Devesh Kumar Bandil,et al. Reversible Data Hiding Techniques , 2012 .
[25] Chin-Chen Chang,et al. A novel data-hiding and compression scheme based on block classification of SMVQ indices , 2016, Digit. Signal Process..
[26] Chengyun Yang,et al. Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[27] Wojciech Szpankowski,et al. Error Resilient LZ'77 Data Compression: Algorithms, Analysis, and Experiments , 2007, IEEE Transactions on Information Theory.
[28] Terry A. Welch,et al. A Technique for High-Performance Data Compression , 1984, Computer.
[29] Chin-Chen Chang,et al. A Reversible Data Hiding Scheme Based on Side Match Vector Quantization , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[30] Wojciech Szpankowski,et al. Joint source-channel LZ'77 coding , 2003, Data Compression Conference, 2003. Proceedings. DCC 2003.
[31] Pierre Moulin,et al. Data-Hiding Codes , 2005, Proceedings of the IEEE.
[32] Wojciech Szpankowski,et al. Error-resilient LZW data compression , 2006, Data Compression Conference (DCC'06).