RETRACTED ARTICLE: A stable image steganography: a novel approach based on modified RSA algorithm and 2–4 least significant bit (LSB) technique
暂无分享,去创建一个
V. Kalaichelvi | H. Manikandan | P. Venkateswari | P. Meenakshi | P. Vimala Devi | S. Swaminathan | P. Venkateswari | V. Kalaichelvi | H. Manikandan | P. Meenakshi | S. Swaminathan | P. Vimala Devi
[1] Malin Premaratne,et al. Key-Based Scrambling for Secure Image Communication , 2012, ICIC.
[2] Jiying Zhao,et al. An Image Quality Evaluation Method Based on Digital Watermarking , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[3] Lin Guoying,et al. An edge-detection method based on adaptive canny algorithm and iterative segmentation threshold , 2016, 2016 2nd International Conference on Control Science and Systems Engineering (ICCSSE).
[4] Donovan Artz,et al. Spotlight: Digital Steganography , 2001, IEEE Internet Comput..
[5] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998 .
[6] J. Jennifer Ranjani,et al. Data hiding using pseudo magic squares for embedding high payload in digital images , 2017, Multimedia Tools and Applications.
[7] N. Sivanandam,et al. A Survey on Cryptography using Optimization algorithms in WSNs , 2015 .
[8] S. Han,et al. A survey of digital image watermarking techniques , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..
[9] José Raymundo Marcial-Romero,et al. A New Optimization Strategy for Solving the Fall-Off Boundary Value Problem in Pixel-Value Differencing Steganography , 2018, Int. J. Pattern Recognit. Artif. Intell..
[10] Min Wu,et al. Data hiding in image and video .I. Fundamental issues and solutions , 2003, IEEE Trans. Image Process..
[11] K. Vijayakumar,et al. Stock market analysis using candlestick regression and market trend prediction (CKRM) , 2020, Journal of Ambient Intelligence and Humanized Computing.
[12] Subariah Ibrahim,et al. Information hiding using steganography , 2003, 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings..
[13] Frank Y. Shih,et al. Digital Watermarking and Steganography: Fundamentals and Techniques , 2007 .
[14] Mamta Juneja,et al. Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.
[15] M. Nithya,et al. Secured segmentation for ICD datasets , 2020 .
[16] Ahmad Habibizad Navin,et al. An Optimized Color Image Steganography Using LFSR and DFT Techniques , 2011 .
[17] Gandharba Swain,et al. A Steganographic Method Combining LSB Substitution and PVD in a Block , 2016 .
[18] R. S. Bichkar,et al. A Secure Spatial Domain Image Steganography Using Genetic Algorithm and Linear Congruential Generator , 2018 .
[19] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[20] Karim Faez,et al. Adaptive image steganography based on transform domain via genetic algorithm , 2017 .
[21] Majid A. Al-Taee,et al. High-capacity image steganography based on Haar DWT for hiding miscellaneous data , 2015, 2015 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT).
[22] Nidhi Chandrakar,et al. Study and comparison of various image edge detection techniques , 2012 .
[23] D. Artz,et al. Digital steganography: hiding data within data , 2001 .
[24] Chin-Chen Chang,et al. Reversible Data Hiding Based on Histogram Modification of Pixel Differences , 2009, IEEE Transactions on Circuits and Systems for Video Technology.
[25] Vijay Kumar,et al. A modified DWT-based image steganography technique , 2017, Multimedia Tools and Applications.
[26] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[27] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[28] C. Arun,et al. Automated risk identification using NLP in cloud based development environments , 2017 .
[29] Frank Y. Shih,et al. Digital Watermarking and Steganography , 2007 .
[30] Gandharba Swain,et al. Performance evaluation parameters of image steganography techniques , 2016, 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS).
[31] M. S. Sutaone,et al. Image based steganography using LSB insertion , 2008 .