A Huffman Code Based Image Steganography Technique
暂无分享,去创建一个
Jyoti Prakash Singh | Sushanta Biswas | Debasree Sarkar | Partha Pratim Sarkar | Amitava Nag | A. Nag | J. Singh | S. Biswas | D. Sarkar | P. Sarkar
[1] Jechang Jeong,et al. Adaptive Huffman coding of 2-D DCT coefficients for image sequence compression , 1995, Signal Process. Image Commun..
[2] David R. McIntyre,et al. Data compression using static Huffman code-decode tables , 1985, CACM.
[3] Chin-Chen Chang,et al. A steganographic method for digital images using side match , 2004, Pattern Recognit. Lett..
[4] Sushanta Biswas,et al. A novel technique for image steganography based on Block-DCT and Huffman Encoding , 2010, ArXiv.
[5] Cheng-Hsing Yang,et al. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.
[6] Qiaoyan Wen,et al. A steganographic method for digital images with four-pixel differencing and modified LSB substitution , 2011, J. Vis. Commun. Image Represent..
[7] M. Hwang,et al. (IEE Proceedings Vision, Image and Signal Processing, 152(5):611-615)Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement , 2005 .
[8] Min-Shiang Hwang,et al. A high quality steganographic method with pixel-value differencing and modulus function , 2008, J. Syst. Softw..
[9] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[10] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..
[11] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[12] M. Hwang,et al. Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .
[13] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[14] Ki-Ryong Kwon,et al. A Steganographic Scheme in Digital Images Using Information of Neighboring Pixels , 2005, ICNC.
[15] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[16] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[17] Yew-Soon Ong,et al. Advances in Natural Computation, First International Conference, ICNC 2005, Changsha, China, August 27-29, 2005, Proceedings, Part I , 2005, ICNC.