Security in Digital Images: From Information Hiding Perspective
暂无分享,去创建一个
[1] Ahmed H. Tewfik,et al. Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[2] Vani Kalloo,et al. An Exploration of Developing Mathematics Content for Mobile Learning , 2015 .
[3] Gunver Majgaard,et al. Teaching Design of Emerging Embodied Technologies , 2014 .
[4] Dimitris Kanellopoulos,et al. Recent Advances in Multimedia Information System Security , 2009, Informatica.
[5] Yong-Huai Huang,et al. Hiding digital watermarks using multiresolution wavelet transform , 2001, IEEE Trans. Ind. Electron..
[6] Huaiqing Wang,et al. Cyber warfare: steganography vs. steganalysis , 2004, CACM.
[7] Rajeev Srivastava,et al. Detection of Cancer from Microscopic Biopsy Images Using Image Processing Tools , 2014 .
[8] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[9] Gary Friedman,et al. The trustworthy digital camera: restoring credibility to the photographic image , 1993 .
[10] Saraju P. Mohanty,et al. Hardware assisted watermarking for multimedia , 2009, Comput. Electr. Eng..
[11] Arun Kumar Yadav,et al. A Survey on Digital Image Steganography and Steganalysis , 2013 .
[12] Carlos Munuera,et al. Steganography and error-correcting codes , 2007, Signal Process..
[13] Sung-Hwan Jung,et al. A survey of watermarking techniques applied to multimedia , 2001, ISIE 2001. 2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat. No.01TH8570).
[14] Shivani Khurana,et al. A Review on Digital Image Watermarking , 2013 .
[15] Chin-Chen Chang,et al. Robust authentication scheme for protecting copyrights of images and graphics , 2002 .
[16] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[17] Imre J. Rudas,et al. From concept to market: Surgical robot development , 2015 .
[18] D. Artz,et al. Digital steganography: hiding data within data , 2001 .
[19] Pedro Isaias,et al. Emerging Research and Trends in Interactivity and the Human-Computer Interface , 2013 .
[20] Lawrence O'Gorman,et al. Protecting ownership rights through digital watermarking , 1996 .
[21] Jean-Jacques Quisquater,et al. Cryptology for digital TV broadcasting , 1995, Proc. IEEE.
[22] Francisco Vicente Cipolla-Ficarra. Advanced Research and Trends in New Technologies, Software, Human-Computer Interaction, and Communicability , 2013 .
[23] G. Coatrieux,et al. A Review of Image Watermarking Applications in Healthcare , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.
[24] Tariq Jamil. Steganography: the art of hiding information in plain sight , 1999 .
[25] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[26] Kshama Pandey. Mobile Education Mitigating the Heavy Magnitude of Illiteracy in India , 2015 .
[27] M. Zamani,et al. An Introduction to Image Steganography Techniques , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).
[28] Valentina Nisi,et al. Experience Prototyping: Gathering Rich Understandings to Guide Design , 2012 .
[29] Panayiotis Zaphiris,et al. Human computer interaction : concepts, methodologies, tools, and applications , 2009 .
[30] Frank Y. Shih,et al. Robust watermarking and compression for medical images based on genetic algorithms , 2005, Inf. Sci..
[31] Simon Nyaga Mwendia,et al. Culture aware M-Learning classification framework for African countries , 2014 .
[32] Bin Li,et al. A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..
[33] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[34] W. J. Dowling,et al. Watermarking digital images for copyright protection , 1996 .
[35] Harold Joseph Highland,et al. Data encryption: A non-mathematical approach , 1997, Comput. Secur..
[36] Ioannis Pitas,et al. A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.