A novel and dependable image steganography model for strengthening the security of cloud storage
暂无分享,去创建一个
Fahad Algarni | Mostafa A. Ahmad | Ahmed Ghoneim | Saleh Alshomrani | Ahmed Samak | Nader Omar | Mostafa A. Ahmad | F. Algarni | S. Alshomrani | A. Samak | A. Ghoneim | Nader Omar
[1] Qian Mao,et al. A fast algorithm for matrix embedding steganography , 2014, Digit. Signal Process..
[2] Manish Mahajan,et al. Adaptive Steganography: A survey of Recent Statistical Aware Steganography Techniques , 2012 .
[3] N. Ahmad,et al. Software Reliability Growth Models with Log-logistic Testing-Effort Function: A Comparative Study , 2013 .
[4] Wei Zhang,et al. Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection , 2018, Signal Process..
[5] Heung-Kyu Lee,et al. Secure Bit-Plane Based Steganography for Secret Communication , 2010, IEICE Trans. Inf. Syst..
[6] Chin-Chen Chang,et al. Hiding secret data in images via predictive coding , 2005, Pattern Recognit..
[7] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[8] Xin Liao,et al. Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels , 2015, J. Vis. Commun. Image Represent..
[9] Don Coppersmith,et al. The Data Encryption Standard (DES) and its strength against attacks , 1994, IBM J. Res. Dev..
[10] Ian H. Witten,et al. Arithmetic coding for data compression , 1987, CACM.
[11] Xinpeng Zhang,et al. Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.
[12] Mohammad Mehdi Rashidi,et al. Increasing image compression rate using steganography , 2013, Expert Syst. Appl..
[13] Yongjian Hu,et al. A high capacity lossless data hiding scheme for JPEG images , 2013, J. Syst. Softw..
[14] Yih-Kai Lin,et al. High capacity reversible data hiding scheme based upon discrete cosine transformation , 2012, J. Syst. Softw..
[15] Mostafa A. Ahmad,et al. Reversible Data Hiding by Integer Wavelet Transform with Lossless EZW Bit-Stream , 2013 .
[16] Hai-Dong Yuan,et al. Secret sharing with multi-cover adaptive steganography , 2014, Inf. Sci..
[17] Cynthia E. Irvine,et al. Surmounting the Effects of Lossy Compression on Steganography , 1996 .
[18] Jerome M. Shapiro,et al. Embedded image coding using zerotrees of wavelet coefficients , 1993, IEEE Trans. Signal Process..
[19] Mingwei Tang,et al. A high capacity image steganography using multi-layer embedding , 2014 .