Current status and key issues in image steganography: A survey
暂无分享,去创建一个
[1] Bülent Sankur,et al. Statistical evaluation of image quality measures , 2002, J. Electronic Imaging.
[2] A. Murat Tekalp,et al. Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.
[3] J. Koenderink. Q… , 2014, Les noms officiels des communes de Wallonie, de Bruxelles-Capitale et de la communaute germanophone.
[4] Hedieh Sajedi,et al. Cover Selection Steganography Method Based on Similarity of Image Blocks , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.
[5] Xinpeng Zhang,et al. Steganography using multiple-base notational system and human vision sensitivity , 2005, IEEE Signal Process. Lett..
[6] K. Kanimozhi,et al. Dual transform based steganography using wavelet families and statistical methods , 2013, 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering.
[7] Jessica J. Fridrich,et al. Distortion-Free Data Embedding for Images , 2001, Information Hiding.
[8] Christophe De Vleeschouwer,et al. Circular interpretation of histogram for reversible watermarking , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).
[9] Jessica J. Fridrich,et al. Invertible authentication , 2001, Security and Watermarking of Multimedia Contents.
[10] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[11] Kuo-Liang Chung,et al. A novel SVD- and VQ-based image hiding scheme , 2001, Pattern Recognit. Lett..
[12] S. M. Youssef,et al. C7. A multi-level information hiding integrating wavelet-based texture analysis of block partition difference images , 2012, 2012 29th National Radio Science Conference (NRSC).
[13] Amit Phadikar,et al. Data hiding based quality access control of digital images using adaptive QIM and lifting , 2011, Signal Process. Image Commun..
[14] Shadrokh Samavi,et al. Steganalysis and payload estimation of embedding in pixel differences using neural networks , 2010, Pattern Recognit..
[15] Nasir D. Memon,et al. Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.
[16] G. Aghila,et al. Reversible dynamic secure steganography for medical image using graph coloring , 2013 .
[17] Fei Peng,et al. Adaptive reversible data hiding scheme based on integer transform , 2012, Signal Process..
[18] Hedieh Sajedi,et al. Using contourlet transform and cover selection for secure steganography , 2010, International Journal of Information Security.
[19] B. S. Manjunath,et al. Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration , 2006, 2006 International Conference on Image Processing.
[20] Chin-Chen Chang,et al. A method of extracting embedded binary data from JPEG bitstreams using standard JPEG decoder , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[21] P. Nadiya,et al. Image steganography in DWT domain using double-stegging with RSA encryption , 2013, 2013 International Conference on Signal Processing , Image Processing & Pattern Recognition.
[22] Shen Wang,et al. A Secure Steganography Method based on Genetic Algorithm , 2010, J. Inf. Hiding Multim. Signal Process..
[23] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[24] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[25] A. Murat Tekalp,et al. Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.
[26] David Chaum,et al. Advances in Cryptology: Proceedings Of Crypto 83 , 2012 .
[27] Chin-Chen Chang,et al. Reversible hiding in DCT-based compressed images , 2007, Inf. Sci..
[28] Tomás Pevný,et al. Benchmarking for Steganography , 2008, Information Hiding.
[29] Anindya Sarkar,et al. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.
[30] Shahrokh Ghaemmaghami,et al. High Capacity Image Steganography in Wavelet Domain , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.
[31] Pradeep M. Patil,et al. Robust and secured image-adaptive data hiding , 2012, Digit. Signal Process..
[32] Hedieh Sajedi,et al. ContSteg: Contourlet-Based Steganography Method , 2009, Wirel. Sens. Netw..
[33] Chin-Chen Chang,et al. Optimizing least-significant-bit substitution using cat swarm optimization strategy , 2012, Inf. Sci..
[34] Jeng-Shyang Pan,et al. Reversible data hiding based on multilevel histogram modification and sequential recovery , 2011 .
[35] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[36] Carl E. Halford,et al. Developing operational performance metrics using image comparison metrics and the concept of degradation space , 1999 .
[37] Heung-Kyu Lee,et al. Improved Steganographic Method Preserving Pixel-Value Differencing Histogram with Modulus Function , 2010, EURASIP J. Adv. Signal Process..
[38] Manish Mahajan,et al. Adaptive Steganography: A survey of Recent Statistical Aware Steganography Techniques , 2012 .
[39] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[40] Jianjun Wang,et al. A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..
[41] Qiaoyan Wen,et al. A steganographic method for digital images with four-pixel differencing and modified LSB substitution , 2011, J. Vis. Commun. Image Represent..
[42] Sushil Jajodia,et al. Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.
[43] Xingming Sun,et al. A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution , 2009 .
[44] Min-Shiang Hwang,et al. Data Hiding: Current Status and Key Issues , 2007, Int. J. Netw. Secur..
[45] Bin Li,et al. A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..
[46] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[47] M.-R. Akbarzadeh-T,et al. A New Genetic Algorithm Approach for Secure JPEG Steganography , 2006, 2006 IEEE International Conference on Engineering of Intelligent Systems.
[48] Yao Zhao,et al. PM1 steganography in JPEG images using genetic algorithm , 2008, Soft Comput..
[49] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[50] Junji Shikata,et al. On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems , 2008, Trans. Data Hiding Multim. Secur..
[51] A. Khamrui,et al. A Genetic Algorithm based steganography in frequency domain (GASFD) , 2011, 2011 International Conference on Communication and Industrial Application.
[52] Gandharba Swain,et al. Steganography using two sided, three sided, and four sided side match methods , 2013, CSI Transactions on ICT.
[53] Sudhir Keshari,et al. Weighted fractional Fourier Transform based image Steganography , 2011, 2011 International Conference on Recent Trends in Information Systems.
[54] S. K. Muttoo,et al. Distortionless Data Hiding Based on Slantlet Transform , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[55] Tung-Shou Chen,et al. Data embedding using pixel value differencing and diamond encoding with multiple-base notational system , 2012, J. Syst. Softw..
[56] Chin-Chen Chang,et al. Multilevel reversible data hiding based on histogram modification of difference images , 2008, Pattern Recognit..
[57] Fenlin Liu,et al. Selecting Cover for Image Steganography by Correlation Coefficient , 2010, 2010 Second International Workshop on Education Technology and Computer Science.
[58] Amir Hossein Farzaneh,et al. Eigenvalue Steganography based on eigen characteristics of quantized DCT matrices , 2011, ICIMU 2011 : Proceedings of the 5th international Conference on Information Technology & Multimedia.
[59] Hyoung Joong Kim,et al. Modified BCH data hiding scheme for JPEG steganography , 2012, EURASIP Journal on Advances in Signal Processing.
[60] E. Chang,et al. Grey level modification steganography for secret communication , 2004, 2nd IEEE International Conference on Industrial Informatics, 2004. INDIN '04. 2004.
[61] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[62] Chin-Chen Chang,et al. A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies , 2013, J. Syst. Softw..
[63] Huaiqing Wang,et al. Cyber warfare: steganography vs. steganalysis , 2004, CACM.
[64] Tom Fawcett,et al. ROC Graphs: Notes and Practical Considerations for Researchers , 2007 .
[65] Hsien-Chu Wu,et al. Reversible image steganographic scheme via predictive coding , 2010, Displays.
[66] Fan Zhang,et al. The upper and lower bounds of the information-hiding capacity of digital images , 2008, Inf. Sci..
[67] Manoj Kumar Ramaiya,et al. Security improvisation in image steganography using DES , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).
[68] Chin-Chen Chang,et al. A reversible data hiding scheme for VQ indices using locally adaptive coding , 2011, J. Vis. Commun. Image Represent..
[69] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[70] Robert M. Hierons,et al. High Capacity Steganographic Method Based Upon JPEG , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[71] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[72] Z. Jane Wang,et al. Correlation-and-Bit-Aware Spread Spectrum Embedding for Data Hiding , 2011, IEEE Transactions on Information Forensics and Security.
[73] S. K. Muttoo,et al. A Multilayered Secure , Robust and High Capacity Image Steganographic Algorithm , 2011 .
[74] Weiwei Liu,et al. Adaptive steganography based on block complexity and matrix embedding , 2013, Multimedia Systems.
[75] Eiji Kawaguchi,et al. Principles and applications of BPCS steganography , 1999, Other Conferences.
[76] Chiang-Lung Liu,et al. High-performance JPEG steganography using complementary embedding strategy , 2008, Pattern Recognit..
[77] Chien-Ping Chang,et al. High-payload image hiding with quality recovery using tri-way pixel-value differencing , 2012, Inf. Sci..
[78] Wei Liu. Data hiding in JPEG 2000 code streams , 2004, ICIP.
[79] T. Kailath. The Divergence and Bhattacharyya Distance Measures in Signal Selection , 1967 .
[80] Fawzi M. Al-Naima,et al. High Capacity Image Steganography Based on Curvelet Transform , 2011, 2011 Developments in E-systems Engineering.
[81] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[82] Jamshid Shanbehzadeh,et al. A steganographic method based on Integer Wavelet Transform and Genetic Algorithm , 2011, 2011 International Conference on Communications and Signal Processing.
[83] Shih-Hsu Chang,et al. A 9/7 wavelet-based lossless data hiding , 2011, 2011 IEEE Symposium On Computational Intelligence For Multimedia, Signal And Vision Processing.
[84] Zhicheng Ni,et al. Distortionless data hiding based on integer wavelet transform , 2002 .
[85] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[86] Nasir D. Memon,et al. Cover Selection for Steganographic Embedding , 2006, 2006 International Conference on Image Processing.
[87] Sushil Kumar,et al. Secure image steganography based on Slantlet transform , 2009, 2009 Proceeding of International Conference on Methods and Models in Computer Science (ICM2CS).
[88] Xinpeng Zhang,et al. Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security , 2004, Pattern Recognit. Lett..
[89] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[90] Qingzhong Liu,et al. JPEG compression immune steganography using wavelet transform , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[91] Chin-Chen Chang,et al. A steganographic scheme by fully exploiting modification directions , 2011, Expert Syst. Appl..
[92] Xingang You,et al. A DCT-based image steganographic method resisting statistical attacks , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[93] N. Kamaraj,et al. Varying radix numeral system based adaptive image steganography , 2011, Inf. Process. Lett..
[94] Xiangwei Kong,et al. Secure steganography based on binary particle swarm optimization , 2009 .
[95] Heung-Kyu Lee,et al. Multi Bit Plane Image Steganography , 2006, IWDW.
[96] Cheng-Hsing Yang,et al. A data hiding scheme using the varieties of pixel-value differencing in multimedia images , 2011, J. Syst. Softw..
[97] Yongjian Hu,et al. An improved VLC-based lossless data hiding scheme for JPEG images , 2013, J. Syst. Softw..
[98] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[99] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[100] Yongjian Hu,et al. A high capacity lossless data hiding scheme for JPEG images , 2013, J. Syst. Softw..