暂无分享,去创建一个
Khan Muhammad | Jamil Ahmad | Haleem Farman | Muhammad Zubair | Khan Muhammad | Haleem Farman | Jamil Ahmad | Muhammad Zubair
[1] Rajarshi Pal,et al. Image steganography using generalized base single digit sum (GB-SDS) , 2013, 2013 Annual IEEE India Conference (INDICON).
[2] Zhou Wang,et al. Multiscale structural similarity for image quality assessment , 2003, The Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, 2003.
[3] Rosziati Ibrahim,et al. Steganography Algorithm to Hide Secret Message inside an Image , 2011, ArXiv.
[4] Khan Muhammad,et al. A Secure Cyclic Steganographic Technique for Color Images using Randomization , 2015, ArXiv.
[5] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[6] Alan C. Bovik,et al. Making a “Completely Blind” Image Quality Analyzer , 2013, IEEE Signal Processing Letters.
[7] Vijay Kumar,et al. Performance evaluation of DWT based image steganography , 2010, 2010 IEEE 2nd International Advance Computing Conference (IACC).
[8] Mehdi Hussain,et al. A Survey of Image Steganography Techniques , 2013 .
[9] M. Chandrasekaran,et al. A novel technique for image steganography using nonlinear chaotic map , 2013, 2013 7th International Conference on Intelligent Systems and Control (ISCO).
[10] David Zhang,et al. FSIM: A Feature Similarity Index for Image Quality Assessment , 2011, IEEE Transactions on Image Processing.
[11] Rafael C. González,et al. Digital image processing using MATLAB , 2006 .
[12] U. A. J. Pinidiyaarachchi,et al. Image steganography scheme based on reversible data embedding strategy , 2013, 2013 8th International Conference on Computer Science & Education.
[13] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[14] Rengarajan Amirtharajan,et al. Standard deviation converges for random image steganography , 2013, 2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES.
[15] Pachiyappan Arulmozhivarman,et al. High security image steganography using IWT and graph theory , 2013, 2013 IEEE International Conference on Signal and Image Processing Applications.
[16] Nadeem Akhtar,et al. Enhancing the Security and Quality of LSB Based Image Steganography , 2013, 2013 5th International Conference on Computational Intelligence and Communication Networks.
[17] Md. Ismail Hossain,et al. A new approach for LSB based image steganography using secret key , 2011, 14th International Conference on Computer and Information Technology (ICCIT 2011).
[18] Yao Zhi-qiang. A Watermarking Scheme Based on Wavelet Transform , 2003 .
[19] Suvamoy Changder,et al. Secure key based image realization steganography , 2013, 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013).
[20] K.R. Venugopal,et al. Authentication of secret information in image Steganography , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.
[21] Zahoor Jan,et al. Energy Based Coefficient Selection for Digital Watermarking in Wavelet Domain , 2010, ICICA.
[22] Kai Zeng,et al. Objective Quality Assessment for Image Retargeting Based on Structural Similarity , 2014, IEEE Journal on Emerging and Selected Topics in Circuits and Systems.
[23] Ravi K Sheth,et al. Image Steganography Techniques , 2015 .
[24] Adnan Abdul-Aziz Gutub,et al. Pixel Indicator Technique for RGB Image Steganography , 2010 .
[25] Manoj Kumar Ramaiya,et al. Security improvisation in image steganography using DES , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).
[26] Zahoor Jan,et al. Genetic programming-based perceptual shaping of a digital watermark in the wavelet domain using Morton scanning , 2012 .
[27] Richard Comley,et al. Colour space effect on tracking in video surveillance , 2010 .
[28] Arfan Jaffar,et al. Watermarking scheme based on wavelet transform, genetic programming and Watson perceptual distortion control model for JPEG2000 , 2010, 2010 6th International Conference on Emerging Technologies (ICET).
[29] Arvind Kumar,et al. Steganography- A Data Hiding Technique , 2010 .
[30] Amar Kumar Mohapatra,et al. Digital Image Authentication Model Based on Edge Adaptive Steganography , 2013, 2013 2nd International Conference on Advanced Computing, Networking and Security.
[31] Sos S. Agaian,et al. Quantifying image similarity using measure of enhancement by entropy , 2007, SPIE Defense + Commercial Sensing.