A novel and dependable image steganography model for strengthening the security of cloud storage

[1]  Qian Mao,et al.  A fast algorithm for matrix embedding steganography , 2014, Digit. Signal Process..

[2]  Manish Mahajan,et al.  Adaptive Steganography: A survey of Recent Statistical Aware Steganography Techniques , 2012 .

[3]  N. Ahmad,et al.  Software Reliability Growth Models with Log-logistic Testing-Effort Function: A Comparative Study , 2013 .

[4]  Wei Zhang,et al.  Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection , 2018, Signal Process..

[5]  Heung-Kyu Lee,et al.  Secure Bit-Plane Based Steganography for Secret Communication , 2010, IEICE Trans. Inf. Syst..

[6]  Chin-Chen Chang,et al.  Hiding secret data in images via predictive coding , 2005, Pattern Recognit..

[7]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[8]  Xin Liao,et al.  Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels , 2015, J. Vis. Commun. Image Represent..

[9]  Don Coppersmith,et al.  The Data Encryption Standard (DES) and its strength against attacks , 1994, IBM J. Res. Dev..

[10]  Ian H. Witten,et al.  Arithmetic coding for data compression , 1987, CACM.

[11]  Xinpeng Zhang,et al.  Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.

[12]  Mohammad Mehdi Rashidi,et al.  Increasing image compression rate using steganography , 2013, Expert Syst. Appl..

[13]  Yongjian Hu,et al.  A high capacity lossless data hiding scheme for JPEG images , 2013, J. Syst. Softw..

[14]  Yih-Kai Lin,et al.  High capacity reversible data hiding scheme based upon discrete cosine transformation , 2012, J. Syst. Softw..

[15]  Mostafa A. Ahmad,et al.  Reversible Data Hiding by Integer Wavelet Transform with Lossless EZW Bit-Stream , 2013 .

[16]  Hai-Dong Yuan,et al.  Secret sharing with multi-cover adaptive steganography , 2014, Inf. Sci..

[17]  Cynthia E. Irvine,et al.  Surmounting the Effects of Lossy Compression on Steganography , 1996 .

[18]  Jerome M. Shapiro,et al.  Embedded image coding using zerotrees of wavelet coefficients , 1993, IEEE Trans. Signal Process..

[19]  Mingwei Tang,et al.  A high capacity image steganography using multi-layer embedding , 2014 .