Image Steganography Using LSB and Edge - Detection Technique
暂无分享,去创建一个
[1] Min-Shiang Hwang,et al. Data Hiding: Current Status and Key Issues , 2007, Int. J. Netw. Secur..
[2] Baljit Singh,et al. Adaptive Thresholding for Edge Detection in Gray Scale Images , 2010 .
[3] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[4] Jessica J. Fridrich,et al. Digital image steganography using stochastic modulation , 2003, IS&T/SPIE Electronic Imaging.
[5] Ahmad T. Al-Taani,et al. Data Embedding Based on Better Use of Bits in Image Pixels , 2008 .
[6] Regunathan Radhakrishnan,et al. Data masking: a secure-covert channel paradigm , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..
[7] Geeta Sikka,et al. A New Image Steganography Based On First Component Alteration Technique , 2010, ArXiv.
[8] Mehdi Hussain,et al. Information Hiding Using Edge Boundaries of Objects , 2011 .
[9] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[10] William Palm,et al. Introduction to Matlab 7 for Engineers , 2004 .
[11] Ying Wang,et al. Steganalysis of block-DCT image steganography , 2003, IEEE Workshop on Statistical Signal Processing, 2003.
[12] Merrill Warkentin,et al. Steganography and Steganalysis , 2006 .
[13] Andrew D. Ker. Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.
[14] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[15] N. Senthilkumaran,et al. Image Segmentation - A Survey of Soft Computing Approaches , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.
[16] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[17] D. Artz,et al. Digital steganography: hiding data within data , 2001 .
[18] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[19] Mamta Juneja,et al. Performance Evaluation of Edge Detection Techniques for Images in Spatial Domain , 2009 .
[20] C. A. Murthy,et al. Thresholding in edge detection: a statistical approach , 2004, IEEE Transactions on Image Processing.
[21] Husrev T. Sencar,et al. Image Steganography: Concepts and Practice , 2004 .
[22] Subariah Ibrahim,et al. Information hiding using steganography , 2003, 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings..
[23] Kh.M. Singh,et al. Hiding Secret Message in Edges of the Image , 2007, 2007 International Conference on Information and Communication Technology.
[24] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[25] Hamid Hassanpour,et al. Edge Detection Techniques: Evaluations and Comparison , 2008 .
[26] Hideki Noda,et al. High capacity and secure digital steganography to palette-based images , 2002, Proceedings. International Conference on Image Processing.
[27] Jan H. P. Eloff,et al. An overview of image steganography , 2005, ISSA.
[28] Tariq Jamil. Steganography: the art of hiding information in plain sight , 1999 .
[29] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[30] Huaiqing Wang,et al. Cyber warfare: steganography vs. steganalysis , 2004, CACM.
[31] Nasir D. Memon,et al. Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[32] M Radha,et al. EDGE DETECTION TECHNIQUES FOR IMAGE SEGMENTATION , 2011 .
[33] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[34] Ching-Nung Yang,et al. Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..
[35] Adrian Biran,et al. Matlab for engineers , 1997 .
[36] Kevin Curran,et al. An Investigation into the Use of the Least Significant Bit Substitution Technique in Digital Watermarking , 2005 .
[37] K.R. Venugopal,et al. Steganalysis of LSB Embedded Images Using Variable Threshold Color Pair Analysis , 2006, 2006 Fourth International Conference on Intelligent Sensing and Information Processing.
[38] Kathryn Hempstalk,et al. Hiding Behind Corners : Using Edges in Images for Better Steganography , 2006 .
[39] Chang-Chou Lin,et al. Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..
[40] J. Krenn,et al. Steganography and Steganalysis , 2006 .
[41] Daisy Jacobs,et al. Implementation of LSB Steganography and Its Evaluation for Various Bits , 2007, 2006 1st International Conference on Digital Information Management.