Standard deviation converges for random image steganography
暂无分享,去创建一个
Rengarajan Amirtharajan | V. Rajesh | P. Archana | G. Devipriya | J. B. B. Rayappan | J. Rayappan | G. Devipriya | Rengarajan Amirtharajan | P. Archana | V. Rajesh
[1] J. Rayappan,et al. Wavelet Pave the Trio Travel for a Secret Mission – A Stego Vision , 2011 .
[2] Amirtharajan,et al. Security Building at the Line of Control for Image Stego , 2010 .
[3] Ja-Chen Lin,et al. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..
[4] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[5] K. Thenmozhi,et al. Firmware for Data Security: A Review , 2012 .
[6] Jiaohua Qin,et al. Random Image Steganography and Steganalysis: Present Status and Future Directions , 2012 .
[7] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[8] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[9] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[10] Rengarajan Amirtharaj,et al. Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA , 2012 .
[11] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[12] K. Thenmozhi,et al. OFDM+CDMA+Stego = Secure Communication: A Review , 2012 .
[13] V. Meena,et al. Seeable visual but not sure of it , 2012, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012).
[14] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[15] Rengarajan Amirtharajan,et al. Horse Riding & Hiding in Image for Data Guarding , 2012 .
[16] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[17] J. Nandhini,et al. Who decides hiding capacity? I, the pixel intensity , 2012, 2012 International Conference on Recent Advances in Computing and Software Systems.
[18] Rengarajan Amirtharaj,et al. Stego on 2n:1 Platform for Users and Embedding , 2011 .
[19] Rengarajan Amirtharajan,et al. MSB over hides LSB — A dark communication with integrity , 2011, 2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application.
[20] K. Thenmozhi,et al. Pixel Forefinger for Gray in Color: A Layer by Layer Stego , 2012 .
[21] Rengarajan Amirtharaj,et al. Inverted Pattern in Inverted Time Domain for Icon Steganography , 2012 .
[22] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[23] Rengarajan Amirtharajan,et al. An intelligent chaotic embedding approach to enhance stego-image quality , 2012, Inf. Sci..
[24] V. Mahalakshmi,et al. Modulation of hiding intensity by channel intensity - Stego by pixel commando , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).
[25] R. Amirtharajan,et al. Wave (let) decide choosy pixel embedding for stego , 2011, 2011 International Conference on Computer, Communication and Electrical Technology (ICCCET).