Survey and Analysis of Current methods of Steganography
暂无分享,去创建一个
[1] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[2] Prosanta Gope,et al. An Enhanced JPEG Steganography Scheme with Encryption Technique , 2010 .
[3] Subariah Ibrahim,et al. Information hiding using steganography , 2003, 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings..
[4] Walter Bender,et al. Applications for data hiding , 2000, IBM Syst. J..
[5] D. P. Gaikwad,et al. Color Image Restoration for an Effective Steganography , 2010 .
[6] A. A. Zaidan,et al. New Design for Information Hiding with in Steganography Using Distortion Techniques , 2010 .
[7] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[8] S. Hemalatha,et al. A Secure Color Image Steganography In Transform Domain , 2013, ArXiv.
[9] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[10] John McHugh,et al. A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.
[11] S. Arivazhagan,et al. COLOUR IMAGE STEGANOGRAPHY USING MEDIAN MAINTENANCE , 2011 .
[12] Nilanjan Dey,et al. A Novel Session Based Dual Steganographic Technique Using DWT and Spread Spectrum , 2012, ArXiv.
[13] Ki-Hyun Jung,et al. Data hiding method using image interpolation , 2009, Comput. Stand. Interfaces.
[14] Pierre Moulin,et al. Data-Hiding Codes , 2005, Proceedings of the IEEE.
[15] B. B. Zaidan,et al. Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques , 2009, ArXiv.
[16] Samir Kumar Bandyopadhyay,et al. GENETIC ALGORITHM BASED SUBSTITUTION TECHNIQUE OF IMAGE STEGANOGRAPHY , 2011 .
[17] Juan E. Tapiador,et al. Steganography in games: A general methodology and its application to the game of Go , 2006, Comput. Secur..
[18] Vijay Kumar Sharma,et al. A STEGANOGRAPHY ALGORITHM FOR HIDING IMAGE IN IMAGE BY IMPROVED LSB SUBSTITUTION BY MINIMIZE DETECTION , 2012 .
[19] Ja-Chen Lin,et al. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..
[20] D. Artz,et al. Digital steganography: hiding data within data , 2001 .
[21] Chin-Chen Chang,et al. Reversible Steganography for VQ-Compressed Images Using Side Matching and Relocation , 2006, IEEE Transactions on Information Forensics and Security.
[22] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[23] Chin-Chen Chang,et al. A Fast and Secure Image Hiding Scheme Based on LSB Substitution , 2002, Int. J. Pattern Recognit. Artif. Intell..
[24] Carlos Munuera,et al. Steganography and error-correcting codes , 2007, Signal Process..
[25] Aarti Kochhar,et al. Transform Domain Analysis of Image Steganography , 2013 .
[26] Chet Hosmer,et al. Discovering Hidden Evidence , 2006, J. Digit. Forensic Pract..
[27] Theodore G. Handel,et al. Hiding Data in the OSI Network Model , 1996, Information Hiding.