Image Steganography: A Review
暂无分享,去创建一个
[1] M.-R. Akbarzadeh-T,et al. A New Genetic Algorithm Approach for Secure JPEG Steganography , 2006, 2006 IEEE International Conference on Engineering of Intelligent Systems.
[2] R. Bhavani,et al. A modified secure digital image steganography based on Discrete Wavelet Transform , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).
[3] M. Afrakhteh,et al. Adaptive steganography scheme using more surrounding pixels , 2010, 2010 International Conference On Computer Design and Applications.
[4] Rainer Böhme,et al. Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics , 2004, ESORICS.
[5] Yih-Kai Lin,et al. High capacity reversible data hiding scheme based upon discrete cosine transformation , 2012, J. Syst. Softw..
[6] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[7] Kevin Curran,et al. Biometric Inspired Digital Image Steganography , 2008, 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ecbs 2008).
[8] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[9] Chin-Chen Chang,et al. Reversible hiding in DCT-based compressed images , 2007, Inf. Sci..
[10] Amir-Masoud Eftekhari-Moghadam,et al. Digital Image Steganography Based on Integer Wavelet Transform and Assignment Algorithm , 2012, 2012 Sixth Asia Modelling Symposium.
[11] S.B. Sadkhan. Cryptography : current status and future trends , 2004, Proceedings. 2004 International Conference on Information and Communication Technologies: From Theory to Applications, 2004..
[12] Cheng-Hsing Yang,et al. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.
[13] Iuon-Chang Lin,et al. Hiding data in spatial domain images with distortion tolerance , 2009, Comput. Stand. Interfaces.
[14] Shyr-Shen Yu,et al. A HDWT-based reversible data hiding method , 2009, J. Syst. Softw..
[15] Elke Franz,et al. Adaptive steganography based on dithering , 2004, MM&Sec '04.
[16] Vijay Kumar,et al. Performance evaluation of DWT based image steganography , 2010, 2010 IEEE 2nd International Advance Computing Conference (IACC).
[17] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[18] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..