暂无分享,去创建一个
Anier Soria-Lorente | Stefan Berres | Ernesto Avila-Domenech | S. Berres | A. Soria-Lorente | Ernesto Avila-Domenech
[1] Ainuddin Wahid Abdul Wahab,et al. Image steganography in spatial domain: A survey , 2018, Signal Process. Image Commun..
[2] Hongqing Zhu,et al. Image representation using separable two-dimensional continuous and discrete orthogonal moments , 2012, Pattern Recognit..
[3] Debasis Giri,et al. Secured steganographic scheme for highly compressed color image using weighted matrix through DCT , 2018 .
[4] 覃征,et al. Objective Image Fusion Quality Evaluation Using Structural Similarity , 2009 .
[5] Senlin Yan,et al. Bivariate Hahn moments for image reconstruction , 2014, Int. J. Appl. Math. Comput. Sci..
[6] Arun Kumar Sangaiah,et al. Medical JPEG image steganography based on preserving inter-block dependencies , 2017, Comput. Electr. Eng..
[7] Roberto Cusani,et al. Peak-Shaped-Based Steganographic Technique for JPEG Images , 2009, EURASIP J. Inf. Secur..
[8] S. Brandt,et al. Special Functions of Mathematical Physics , 2011 .
[9] Samir Kumar Bandyopadhyay,et al. LSB Layer Independent Robust Steganography using Binary Addition , 2016 .
[10] Eko Hari Rachmawanto,et al. Secure Image Steganography Algorithm Based on DCT with OTP Encryption , 2017 .
[11] Nikita J. Kulkarni,et al. A sparse representation based image steganography using Particle Swarm Optimization and wavelet transform , 2017, Alexandria Engineering Journal.
[12] Ibrahim Kamel,et al. Toward optimal embedding capacity for transform domain steganography: a quad-tree adaptive-region approach , 2017, Multimedia Tools and Applications.
[13] Rene F. Swarttouw,et al. Hypergeometric Orthogonal Polynomials , 2010 .
[14] Safwan El Assad,et al. Enhancement using chaos of a steganography method in DCT domain , 2015, 2015 Fifth International Conference on Digital Information and Communication Technology and its Applications (DICTAP).
[15] Abdelwahab K. Alsammak,et al. Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3 , 2017, Ain Shams Engineering Journal.
[16] Yao Zhao,et al. PM1 steganography in JPEG images using genetic algorithm , 2008, Soft Comput..
[17] Rachid Benouini,et al. 3D image analysis by separable discrete orthogonal moments based on Krawtchouk and Tchebichef polynomials , 2017, Pattern Recognit..
[18] Ming-Kuei Hu,et al. Visual pattern recognition by moment invariants , 1962, IRE Trans. Inf. Theory.
[19] Umesh Ghanekar,et al. Image steganography based on Canny edge detection, dilation operator and hybrid coding , 2018, J. Inf. Secur. Appl..
[20] Madhumita Sengupta,et al. A Novel Hash based Technique for Thermal Image Authentication , 2013 .
[21] Nur Azman Abu,et al. Using tchebichef moment for fast and efficient image compression , 2010, Pattern Recognition and Image Analysis.
[22] Barnali Gupta Banik,et al. Novel Text Steganography Using Natural Language Processing and Part-of-Speech Tagging , 2020 .
[23] Tanveer J. Siddiqui,et al. A Security Enhanced Robust Steganography Algorithm for Data Hiding , 2012 .
[24] Bartek Rajwa,et al. A numerical recipe for accurate image reconstruction from discrete orthogonal moments , 2007, Pattern Recognit..
[25] Huazhong Shu,et al. Medical Image Blind Integrity Verification with Krawtchouk Moments , 2018, Int. J. Biomed. Imaging.
[26] Jan Flusser,et al. Fast computation of Krawtchouk moments , 2014, Inf. Sci..
[27] Peyman Ayubi,et al. A new transform domain steganography based on modified logistic chaotic map for color images , 2017, J. Inf. Secur. Appl..
[28] Bing Hu,et al. Local Feature Extraction Property of Krawtchouk Moment , 2013 .
[29] Randa Atta,et al. A high payload steganography mechanism based on wavelet packet transformation and neutrosophic set , 2018, J. Vis. Commun. Image Represent..
[30] Yu Cao,et al. An Adaptive Audio Steganography for Covert Wireless Communication , 2018, Secur. Commun. Networks.
[31] Dimitris E. Koulouriotis,et al. Image watermarking via separable moments , 2013, Multimedia Tools and Applications.
[33] V. B. Uvarov,et al. Classical Orthogonal Polynomials of a Discrete Variable , 1991 .
[34] Sim Heng Ong,et al. Image Analysis by Tchebichef Moments , 2001, IEEE Trans. Image Process..
[35] Kapil Sharma,et al. Robust stego-key directed LSB substitution scheme based upon cuckoo search and chaotic map , 2018, Optik.
[36] J. K. Mandal,et al. A Genetic Algorithm based Steganography Using Discrete Cosine Transformation (GASDCT) , 2013 .
[37] Rim Zahmoul,et al. Image encryption based on new Beta chaotic maps , 2017 .
[38] S. M. Elshoura,et al. A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments , 2013, Signal Process. Image Commun..
[39] T. Gireeshkumar,et al. Relating the Embedding Efficiency of LSB Steganography Techniques in Spatial and Transform Domains , 2016 .
[40] Abid Yahya,et al. Secured and robust information hiding scheme , 2013 .
[41] Vijay H. Mankar,et al. Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..
[42] S. M. Elshoura,et al. High capacity blind information hiding schemes using Tchebichef moments , 2010, 2010 2nd International Conference on Future Computer and Communication.
[43] Peyman Ayubi,et al. An integer wavelet transform image steganography method based on 3D sine chaotic map , 2018, Multim. Tools Appl..
[44] Raveendran Paramesran,et al. Image analysis by Krawtchouk moments , 2003, IEEE Trans. Image Process..
[45] Pradeep M. Patil,et al. Robust and secured image-adaptive data hiding , 2012, Digit. Signal Process..
[46] M. Teague. Image analysis via the general theory of moments , 1980 .
[47] Aparajita Ojha,et al. Chaotic system-based secure data hiding scheme with high embedding capacity , 2018, Comput. Electr. Eng..
[48] Safya Belghith,et al. A new adaptive image steganography scheme based on DCT and chaotic map , 2017, Multimedia Tools and Applications.
[49] Raveendran Paramesran,et al. Image Analysis Using Hahn Moments , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[50] Ibrahim Kamel,et al. High-capacity steganography: a global-adaptive-region discrete cosine transform approach , 2017, Multimedia Tools and Applications.
[51] Leonardo Palacios-Luengas,et al. A steganographic method using Bernoulli's chaotic maps , 2016, Comput. Electr. Eng..
[52] Suvamoy Changder,et al. Chaos based Edge Adaptive Image Steganography , 2013 .
[53] Anier Soria Lorente,et al. Steganographic algorithm of private key on the domain of the cosine discrete transform , 2016 .
[54] Hassan Qjidaa,et al. Image analysis using separable discrete moments of Charlier-Hahn , 2014, Multimedia Tools and Applications.
[55] A. Bovik,et al. A universal image quality index , 2002, IEEE Signal Processing Letters.
[56] Anier Soria-Lorente,et al. A Secure Steganographic Algorithm Based on Frequency Domain for the Transmission of Hidden Information , 2017, Secur. Commun. Networks.
[57] Swathi Karri,et al. Steganographic algorithm based on randomization of DCT kernel , 2014, Multimedia Tools and Applications.
[58] Yih-Kai Lin,et al. A data hiding scheme based upon DCT coefficient modification , 2014, Comput. Stand. Interfaces.
[59] Christian Cachin,et al. An information-theoretic model for steganography , 2004, Inf. Comput..