A High Quality Steganographic Method Using Morphing
暂无分享,去创建一个
[1] Gandharba Swain,et al. LSB Array Based Image Steganography Technique by Exploring the Four Least Significant Bits , 2011 .
[2] Chao-Hung Lin,et al. A High Capacity 3D Steganography Algorithm , 2009, IEEE Transactions on Visualization and Computer Graphics.
[3] Sanjay N. Talbar,et al. Image Morphing Concept for Secure Transmission of Image Data Contents over Internet , 2010 .
[4] Min-Shiang Hwang,et al. A high quality steganographic method with pixel-value differencing and modulus function , 2008, J. Syst. Softw..
[5] G. Prasad,et al. Two New Approaches for Secured Image Steganography Using Cryptographic Techniques and Type Conversions , 2010 .
[6] Qiangfu Zhao,et al. Information Hiding Based on Image Morphing , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).
[7] Hiromasa Suzuki,et al. Metamorphosis of Arbitrary Triangular Meshes , 2000, IEEE Computer Graphics and Applications.
[8] Ran-Zan Wang,et al. High-payload image steganography using two-way block matching , 2006, IEEE Signal Processing Letters.
[9] Nasir D. Memon,et al. Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography , 2006, Trans. Data Hiding Multim. Secur..
[10] Ajaz Hussain Mir,et al. Classification of steganalysis techniques: A study , 2010, Digit. Signal Process..
[11] Ying Wang,et al. Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions , 2007, IEEE Transactions on Information Theory.
[12] Phillip A. Regalia,et al. Cryptographic Secrecy of Steganographic Matrix Embedding , 2008, IEEE Transactions on Information Forensics and Security.
[13] Cheng-Hsing Yang,et al. Inverted pattern approach to improve image quality of information hiding by LSB substitution , 2008, Pattern Recognit..
[14] Ekta Walia,et al. An Analysis of LSB & DCT based Steganography , 2010 .
[15] R. Akila,et al. A Comparative Analysis of Image Steganography , 2010 .
[16] Xinpeng Zhang,et al. Efficient Data Hiding With Plus-Minus One or Two , 2010, IEEE Signal Processing Letters.
[17] Hedieh Sajedi,et al. Secure steganography based on embedding capacity , 2009, International Journal of Information Security.
[18] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[19] Satoshi Kondo,et al. A Novel Steganographic Technique Based on Image Morphing , 2006, UIC.
[20] Qiaoyan Wen,et al. A steganographic method for digital images with four-pixel differencing and modified LSB substitution , 2011, J. Vis. Commun. Image Represent..
[21] Te-Ming Tu,et al. A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing , 2008, J. Multim..
[22] Yao Zhao,et al. Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm , 2010, EURASIP J. Adv. Signal Process..
[23] Cheng-Hsiung Hsieh,et al. Image Enhancement and Image Hiding Based on Linear Image Fusion , 2011 .
[24] Chin-Chen Chang,et al. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..
[25] R. Shreelekshmi,et al. Cover Image Preprocessing for More Reliable LSB Replacement Steganography , 2010, 2010 International Conference on Signal Acquisition and Processing.
[26] K B Raja,et al. HIGH CAPACITY AND SECURITY STEGANOGRAPHY USING DISCRETE WAVELET TRANSFORM , 2009 .
[27] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[28] Nameer N. El-Emam. Hiding a Large Amount of Data with High Security Using Steganography Algorithm , 2007 .
[29] Mohamed A. Bamatraf,et al. Data Hiding by LSB Substitution Using Genetic Optimal Key-Permutation , 2011, Int. Arab. J. e Technol..
[30] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[31] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[32] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..
[33] Nasir D. Memon,et al. Performance study of common image steganography and steganalysis techniques , 2006, J. Electronic Imaging.
[34] H. B. Kekre,et al. Increased Capacity of Information Hiding in LSB's Method for Text and Image , 2008 .