StegCure: a comprehensive steganographic tool using enhanced LSB scheme
暂无分享,去创建一个
Wei Kuang Lai | Lip Yee Por | Tan Fong Ang | B. Delina | Z. Alireza | Moon Ting Su | L. Y. Por | T. F. Ang | B. Delina | M. T. Su | W. Lai | Z. Alireza
[1] Z.C. Ji,et al. A New Algorithm of Steganography based on Palette Image , 2006, 2006 1ST IEEE Conference on Industrial Electronics and Applications.
[2] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[3] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[4] Eugene Hecht,et al. Optics, 2nd Edition , 1987 .
[5] Cormac Herley,et al. KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[6] Jan H. P. Eloff,et al. An overview of image steganography , 2005, ISSA.
[7] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.
[8] Nasir D. Memon,et al. Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[9] Peter Wayner,et al. Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition) , 2002 .
[10] Julian E. Boggess,et al. Compression of color information in digitized images using an artificial neural network , 1994, Proceedings of National Aerospace and Electronics Conference (NAECON'94).
[11] Y.P. Huang,et al. The Assessment System of Human Visual Spectral Sensitivity Curve by Frequency Modulated Light , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.
[12] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[13] Stefan Katzenbeisser,et al. Hiding Techniques for Steganog - raphy and Digital Watermarking , 2000 .
[14] Abraham Lempel,et al. Compression of individual sequences via variable-rate coding , 1978, IEEE Trans. Inf. Theory.
[15] Der-Chyuan Lou,et al. Steganographic Method for Secure Communications , 2002, Comput. Secur..
[16] John Kadvany,et al. Positional Value and Linguistic Recursion , 2007 .
[17] Roshidi Din,et al. The capability of image in hiding a secret message , 2006 .
[18] Andrew D. Ker. Steganalysis of Embedding in Two Least-Significant Bits , 2007, IEEE Transactions on Information Forensics and Security.
[19] A. Murat Tekalp,et al. Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.
[20] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[21] Mohammad Shirali Shahreza. An improved method for steganography on mobile phone , 2005 .
[22] N. Memon,et al. Transcoding GIF images to JPEG-LS , 1997 .
[23] Daisy Jacobs,et al. Implementation of LSB Steganography and Its Evaluation for Various Bits , 2007, 2006 1st International Conference on Digital Information Management.
[24] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[25] Julie K. Petersen. Telecommunications Illustrated Dictionary , 2002 .
[26] Kefa Rabah,et al. Steganography-The Art of Hiding Data , 2004 .
[27] Lip Yee Por,et al. WhiteSteg: a new scheme in information hiding using text steganography , 2008 .