LSB Pseudorandom Algorithm for Image Steganography Using Skew Tent Map
暂无分享,去创建一个
R. Vázquez-Medina | Ricardo Francisco Martinez-Gonzalez | L. Palacios-Luengas | J. L. Pichardo-Méndez | O. Jiménez-Ramírez | R. Vázquez-Medina | O. Jiménez-Ramírez | L. Palacios-Luengas | R. Martínez-González
[1] Melad J. Saeed,et al. A NEW TECHNIQUE BASED ON CHAOTIC STEGANOGRAPHY AND ENCRYPTION TEXT IN DCT DOMAIN FOR COLOR IMAGE , 2013 .
[2] Gholamreza Akbarizadeh,et al. A New Statistical-Based Kurtosis Wavelet Energy Feature for Texture Recognition of SAR Images , 2012, IEEE Transactions on Geoscience and Remote Sensing.
[3] Awais Ahmad,et al. An adaptive hybrid fuzzy-wavelet approach for image steganography using bit reduction and pixel adjustment , 2018, Soft Comput..
[4] Jakub Safarik,et al. JPEG steganography with particle swarm optimization accelerated by AVX , 2020, Concurr. Comput. Pract. Exp..
[5] Souvik Roy,et al. Online payment system using steganography and visual cryptography , 2014, 2014 IEEE Students' Conference on Electrical, Electronics and Computer Science.
[6] Gholamreza Akbarizadeh,et al. Integration of Spectral Histogram and Level Set for Coastline Detection in SAR Images , 2019, IEEE Transactions on Aerospace and Electronic Systems.
[7] Kamrul Hasan Talukder,et al. An Improved Approach in Audio Steganography Using Genetic Algorithm with K-Bit Symmetric Security Key , 2018, 2018 21st International Conference of Computer and Information Technology (ICCIT).
[8] Fan Wang,et al. Deep Convolutional Neural Network Used in Single Sample per Person Face Recognition , 2018, Comput. Intell. Neurosci..
[9] Sorina Dumitrescu,et al. Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..
[10] Harpreet Kaur,et al. A Survey on different techniques of steganography , 2016 .
[11] Song Huang,et al. Digital Watermarking Based on Neural Network and Image Features , 2009, 2009 Second International Conference on Information and Computing Science.
[12] Wei Sun,et al. High payload image steganography with minimum distortion based on absolute moment block truncation coding , 2015, Multimedia Tools and Applications.
[13] Hongyu Li,et al. VSI: A Visual Saliency-Induced Index for Perceptual Image Quality Assessment , 2014, IEEE Transactions on Image Processing.
[14] Karla K. Evans,et al. Intention, attention and long-term memory for visual scenes: It all depends on the scenes , 2018, Cognition.
[15] Kamaldeep Joshi,et al. New approach toward data hiding using XOR for image steganography , 2016, 2016 Ninth International Conference on Contemporary Computing (IC3).
[16] Robert Jarusek,et al. Robust steganographic method based on unconventional approach of neural networks , 2018, Appl. Soft Comput..
[17] Sakshi Pratap,et al. Image Encryption and Steganography Using Chaotic Maps with a Double Key Protection , 2014, SocProS.
[18] Sung Wook Baik,et al. Image steganography using uncorrelated color space and its application for security of visual contents in online social networks , 2016, Future Gener. Comput. Syst..
[19] Hui Tian,et al. Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs , 2017, Signal Process..
[20] Aggelos Kiayias,et al. BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..
[21] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[22] Christian Cachin,et al. An information-theoretic model for steganography , 2004, Inf. Comput..
[23] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[24] Asma Raeisi,et al. Combined Method of an Efficient Cuckoo Search Algorithm and Nonnegative Matrix Factorization of Different Zernike Moment Features for Discrimination Between Oil Spills and Lookalikes in SAR Images , 2018, IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing.
[25] Peter Kovesi,et al. Image Features from Phase Congruency , 1995 .
[26] Mohamed Nadif,et al. Simultaneous Spectral Data Embedding and Clustering , 2018, IEEE Transactions on Neural Networks and Learning Systems.
[27] Mohammad Shorif Uddin,et al. Image Quality Assessment through FSIM, SSIM, MSE and PSNR—A Comparative Study , 2019, Journal of Computer and Communications.
[28] Shanyu Tang,et al. An efficient and secure VoIP communication system with chaotic mapping and message digest , 2017, Multimedia Systems.
[29] Mikhail Belkin,et al. Laplacian Eigenmaps and Spectral Techniques for Embedding and Clustering , 2001, NIPS.
[30] Dany Thomas Koshy,et al. Steganography on thermal images using generation technique , 2014, 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies.
[31] Ajay Jadhav,et al. Steganography An Art of Hiding Data , 2009, ArXiv.
[32] Manas Kumar Haldar,et al. Online Voting System based on Image Steganography and Visual Cryptography , 2017, J. Comput. Inf. Technol..
[33] Engin Avci,et al. Application of Similarity-Based Image Steganography Method to Computerized Tomography Images , 2019, 2019 7th International Symposium on Digital Forensics and Security (ISDFS).
[34] Weiming Zhang,et al. On the fault-tolerant performance for a class of robust image steganography , 2018, Signal Process..
[35] KokSheik Wong,et al. Data embedding in random domain , 2015, Signal Process..
[36] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[37] Hedieh Sajedi,et al. Steganalysis based on steganography pattern discovery , 2016, J. Inf. Secur. Appl..
[38] Rainer Steinwandt,et al. Combined schemes for signature and encryption: The public-key and the identity-based setting , 2016, Inf. Comput..
[39] Philip C. Ritchey,et al. Synthetic steganography: Methods for generating and detecting covert channels in generated media , 2015 .
[40] Jessica J. Fridrich,et al. Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.
[41] Weiming Zhang,et al. Image camouflage by reversible image transformation , 2016, J. Vis. Commun. Image Represent..
[42] Miguel Castelo-Branco,et al. Distinct preference for spatial frequency content in ventral stream regions underlying the recognition of scenes, faces, bodies and other objects , 2016, Neuropsychologia.
[43] Randa Atta,et al. A high payload steganography mechanism based on wavelet packet transformation and neutrosophic set , 2018, J. Vis. Commun. Image Represent..
[44] Kevin Curran,et al. An overview of steganography techniques applied to the protection of biometric data , 2017, Multimedia Tools and Applications.
[45] Faramarz Sadeghi,et al. Optimizing image steganography by combining the GA and ICA , 2015, ISC Int. J. Inf. Secur..
[46] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[47] Jilei Zhou,et al. Chaos optimization algorithms based on chaotic maps with different probability distribution and search speed for global optimization , 2014, Commun. Nonlinear Sci. Numer. Simul..
[48] Alexei A. Efros,et al. The Unreasonable Effectiveness of Deep Features as a Perceptual Metric , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[49] Sarah V. Hart,et al. Forensic Examination of Digital Evidence: A Guide for Law Enforcement , 2014 .
[50] David Zhang,et al. FSIM: A Feature Similarity Index for Image Quality Assessment , 2011, IEEE Transactions on Image Processing.
[51] Ying He,et al. Steganography with pixel-value differencing and modulus function based on PSO , 2018, J. Inf. Secur. Appl..
[52] Robert M. Haralick,et al. Textural Features for Image Classification , 1973, IEEE Trans. Syst. Man Cybern..
[53] Stamatios V. Kartalopoulos,et al. Annulling Traps & Fixed Traps in Chaos Cryptography , 2008, 2008 New Technologies, Mobility and Security.
[54] S. Lippman,et al. The Scripps Institution of Oceanography , 1959, Nature.
[55] Muhammad Arslan Usman,et al. Using image steganography for providing enhanced medical data security , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[56] E. T. Sivadasan,et al. Secure transmission of data by splitting image , 2015, 2015 International Conference on Computing and Network Communications (CoCoNet).
[57] Shohreh Kasaei,et al. Cellular learning automata-based color image segmentation using adaptive chains , 2009, 2009 14th International CSI Computer Conference.
[58] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[59] Nasir D. Memon,et al. On steganalysis of random LSB embedding in continuous-tone images , 2002, Proceedings. International Conference on Image Processing.
[60] P. Shanmugavadivu,et al. FOSIR: Fuzzy-Object-Shape for Image Retrieval applications , 2016, Neurocomputing.
[61] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[62] Karim Faez,et al. Adaptive image steganography based on transform domain via genetic algorithm , 2017 .
[63] Vijay H. Mankar,et al. Curvelet transform and cover selection for secure steganography , 2018, Multimedia Tools and Applications.
[64] Savita Gupta,et al. Image Recognition using Coefficient of Correlation and Structural SIMilarity Index in Uncontrolled Environment , 2012 .
[65] Antonio Torralba,et al. Modeling the Shape of the Scene: A Holistic Representation of the Spatial Envelope , 2001, International Journal of Computer Vision.
[66] T. Gireeshkumar,et al. Relating the Embedding Efficiency of LSB Steganography Techniques in Spatial and Transform Domains , 2016 .
[67] Vijay H. Mankar,et al. Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..
[68] Mladen D. Veinovic,et al. A new way of covert communication by steganography via JPEG images within a Microsoft Word document , 2015, Multimedia Systems.
[69] Leonardo Palacios-Luengas,et al. Symmetric cryptosystem based on skew tent map , 2017, Multimedia Tools and Applications.
[70] H. Noda,et al. Application of bit-plane decomposition steganography to JPEG2000 encoded images , 2002, IEEE Signal Processing Letters.
[71] Iqtadar Hussain,et al. A technique for digital steganography using chaotic maps , 2014 .