Image Steganography Based on Mantissa Replacement using LWT
暂无分享,去创建一个
K. R. Venugopal | K. B. Raja | N. Sathisha | K Suresh Babu | K. Venugopal | K. Raja | K. Babu | N. Sathisha
[1] Wei Lu,et al. Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture , 2015, IEEE Transactions on Information Forensics and Security.
[2] Hung T. Nguyen,et al. An efficient steganography method for hiding patient confidential information , 2014, 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[3] R. Bhavani,et al. Dual Wavelet Transform in Color Image Steganography Method , 2014, 2014 International Conference on Electronics and Communication Systems (ICECS).
[4] Juan M. Gutierrez-Cardenas,et al. Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators , 2014, 2014 IEEE 38th International Computer Software and Applications Conference Workshops.
[5] Sunny Dagar,et al. Highly randomized image steganography using secret keys , 2014, International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014).
[6] Yun Q. Shi,et al. Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[7] Md Sazzad Hossain,et al. Improving the non-filtering steganographic algorithm using LSB verification method , 2014, 2014 International Conference on Electrical Engineering and Information & Communication Technology.
[8] Nadeem Akhtar,et al. An Improved Module Based Substitution Steganography Method , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.
[9] Poonam,et al. An enhanced Least Significant Bit steganography method using midpoint circle approach , 2014, 2014 International Conference on Communication and Signal Processing.
[10] Wei Wang,et al. HPS: Histogram preserving steganography in spatial domain , 2014, 2nd International Workshop on Biometrics and Forensics.
[11] Monika Mathur,et al. Chaotic map based steganography of gray scale images in wavelet domain , 2014, 2014 International Conference on Signal Processing and Integrated Networks (SPIN).
[12] A. Raj,et al. Comparison of LSB based and HS based reversible data hiding techniques , 2014, 2014 2nd International Conference on Devices, Circuits and Systems (ICDCS).
[13] R. Pal,et al. Image steganography using single digit sum with varying base , 2014, 2014 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT).
[14] Vipin Kumar,et al. Key Dependent Image Steganography Using Edge Detection , 2014, 2014 Fourth International Conference on Advanced Computing & Communication Technologies.
[15] Sumedha Sirsikar,et al. Analysis of Data Hiding Using Digital Image Signal Processing , 2014, 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies.
[16] Z. Azimifar,et al. Image steganography based on pixel ranking and Particle Swarm Optimization , 2012, The 16th CSI International Symposium on Artificial Intelligence and Signal Processing (AISP 2012).
[17] Mugurel Ionut Andreica,et al. SCONeP: Steganography and Cryptography approach for UDP and ICMP , 2011, 2011 RoEduNet International Conference 10th Edition: Networking in Education and Research.
[18] El Mamoun Souidi,et al. A novel steganographic method for gray-level images with four-pixel differencing and LSB substitution , 2011, 2011 International Conference on Multimedia Computing and Systems.
[19] Paul Cotae,et al. On the baseband communication performance of physical layer steganography , 2011, 2011 45th Annual Conference on Information Sciences and Systems.
[20] Madhumita Sengupta,et al. Steganographic Technique Based on Minimum Deviation of Fidelity (STMDF) , 2011, 2011 Second International Conference on Emerging Applications of Information Technology.
[21] Weiming Zhang,et al. Generalization and Analysis of the Paper Folding Method for Steganography , 2010, IEEE Transactions on Information Forensics and Security.
[22] Shang-Kuan Chen,et al. High-Payload Image Hiding Scheme Using k-Way Block Matching , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[23] Richard E. Newman,et al. J3: High payload histogram neutral JPEG steganography , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[24] Paresh Marwaha,et al. Visual cryptographic steganography in images , 2010, 2010 Second International conference on Computing, Communication and Networking Technologies.
[25] Tao Zhang,et al. Improved LSB matching steganography resisting histogram attacks , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[26] George Ghinea,et al. Stego image quality and the reliability of PSNR , 2010, 2010 2nd International Conference on Image Processing Theory, Tools and Applications.
[27] Zhaohui Li,et al. Statistical analysis against improved BPCS steganography , 2010, 2010 2nd International Conference on Advanced Computer Control.
[28] Chao Wang,et al. A content-adaptive approach for reducing embedding impact in steganography , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[29] Shu-Fen Tu,et al. Finding Optimal LSB Substitution Using Ant Colony Optimization Algorithm , 2010, 2010 Second International Conference on Communication Software and Networks.
[30] Ling-di Ping,et al. A New Steganography Algorithm Based on Spatial Domain , 2009, 2009 Second International Symposium on Information Science and Engineering.
[31] Moazzam Hossain,et al. Variable rate Steganography in gray scale digital images using neighborhood pixel information , 2009, 2009 12th International Conference on Computers and Information Technology.
[32] Ruisong Ye. A Novel Digital Image Hiding Scheme Based on Matrix Decomposition , 2009, 2009 International Forum on Information Technology and Applications.
[33] Kaliappan Gopalan,et al. A unified audio and image steganography by spectrum modification , 2009, 2009 IEEE International Conference on Industrial Technology.
[34] Tom E. Bishop,et al. Blind Image Restoration Using a Block-Stationary Signal Model , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[35] Hideki Noda,et al. High capacity and secure digital steganography to palette-based images , 2002, Proceedings. International Conference on Image Processing.
[36] Wim Sweldens,et al. The lifting scheme: a construction of second generation wavelets , 1998 .
[37] Juan M. Gutiérrez Cárdenas. Secret Key Steganography with Message Obfuscation by Pseudo-random Number Generators , 2014, COMPSAC Workshops.