FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks
暂无分享,去创建一个
[1] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[2] Amir-Masoud Eftekhari-Moghadam,et al. An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method , 2015, Appl. Soft Comput..
[3] Tao Han,et al. LSB steganographic payload location for JPEG-decompressed images , 2015, Digit. Signal Process..
[4] Mark Owens March,et al. A Discussion of Covert Channels and Steganography , 2002 .
[5] Musheer Ahmad,et al. A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping , 2009 .
[6] S. Lanzisera,et al. Steganography in 802.15.4 wireless communication , 2008, 2008 2nd International Symposium on Advanced Networks and Telecommunication Systems.
[7] Fathi E. Abd El-Samie,et al. Performance of the audio signals transmission over wireless networks with the channel interleaving considerations , 2012, EURASIP J. Audio Speech Music. Process..
[8] Yixian Yang,et al. Analysis of Current Steganography Tools: Classifications & Features , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.
[9] K. Chandrasekaran,et al. New Data Hiding Technique in Encrypted Image: DKL Algorithm (Differing Key Length) , 2015 .
[10] Nawal A. El-Fishawy,et al. JPEG image transmission over mobile network with an efficient channel coding and interleaving , 2012 .
[11] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[12] Fathi E. Abd El-Samie,et al. Secure Wireless Image Communication Using LSB Steganography and Chaotic Baker Ciphering , 2016, Wireless Personal Communications.
[13] George M. Joseph. High Security Cryptographic Technique Using Steganography and Chaotic Image Encryption , 2013 .
[14] Malla Reddy,et al. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image in painting , 2015 .
[15] Sos S. Agaian,et al. Quantifying image similarity using measure of enhancement by entropy , 2007, SPIE Defense + Commercial Sensing.
[16] Xingming Sun,et al. Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..
[17] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[18] P. Nandakumar,et al. A Triple-Key chaotic image encryption method , 2011, 2011 International Conference on Communications and Signal Processing.
[19] Mamta Juneja,et al. Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.
[20] Kaustubh Choudhary. Image Steganography and Global Terrorism , 2012 .
[21] Daisy Jacobs,et al. Implementation of LSB Steganography and Its Evaluation for Various Bits , 2007, 2006 1st International Conference on Digital Information Management.
[22] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[23] Ali Kanso,et al. A robust chaotic algorithm for digital image steganography , 2014, Commun. Nonlinear Sci. Numer. Simul..
[24] Chin-Chen Chang,et al. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting , 2014, IEEE Transactions on Image Processing.
[25] M. A. M. El-Bendary,et al. Enhancing Transmission over Wireless Image Sensor Networks Based on ZigBee Network , 2014 .
[26] A H M Kamal. Steganography: Securing Message in wireless network , 2013, BIOINFORMATICS 2013.
[27] Sung Wook Baik,et al. Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices , 2017, Multimedia Tools and Applications.
[28] K.B. Raja,et al. A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.
[29] Vijay Kumar,et al. User Priority Based Search on Organizing User Search Histories with Security , 2013 .
[30] Fathi E. Abd El-Samie,et al. Content Verification of Encrypted Images Transmitted Over Wireless AWGN Channels , 2016, Wirel. Pers. Commun..
[31] Chin-Chen Chang,et al. An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism , 2013, IEEE Transactions on Circuits and Systems for Video Technology.
[32] Fathi E. Abd El-Samie,et al. An SVD audio watermarking approach using chaotic encrypted images , 2011, Digit. Signal Process..
[33] Xinpeng Zhang,et al. Effective reversible data hiding in encrypted image with privacy protection for image content , 2015, J. Vis. Commun. Image Represent..
[34] S. Goel,et al. Comparison of Image Steganography Techniques , 2013 .
[35] Vinod Patidar,et al. Image encryption using chaotic logistic map , 2006, Image Vis. Comput..
[36] Muhammad Khurram Khan,et al. Dynamic weighted discrimination power analysis: A novel approach for face and palmprint recognition in DCT domain , 2010 .
[37] S. El-Rabaie,et al. Chaotic Interleaving for Robust Image Transmission with LDPC Coded OFDM , 2014, Wirel. Pers. Commun..
[38] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[39] Mohsen A M El-Bend Ary. Developing Security Tools of WSN and WBAN Networks Applications , 2015 .
[40] Qian Wang,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.