9/7 IWT Domain Data Hiding in Image using Adaptive and Non Adaptive Methods
暂无分享,去创建一个
Prateek Jain | V. Thanikaiselvan | Shounak Shastri | Tushar Bansal | Prateek Jain | V. Thanikaiselvan | Shounak Shastri | Tushar Bansal
[1] Pachiyappan Arulmozhivarman,et al. High security image steganography using IWT and graph theory , 2013, 2013 IEEE International Conference on Signal and Image Processing Applications.
[2] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[3] H. H. Zayed,et al. An adaptive steganographic technique based on integer wavelet transform , 2009, 2009 International Conference on Networking and Media Convergence.
[4] Shen Wang,et al. An Integer DCT and Affine Transformation Based Image Steganography Method , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[5] Cheng-Hsing Yang,et al. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.
[6] K. Thenmozhi,et al. Pixel scattering matrix formalism for image encryption—A key scheduled substitution and diffusion approach , 2015 .
[7] Peter Jorgensen,et al. Applied cryptography: Protocols, algorithm, and source code in C: By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN 0-471-59756-2 , 1996 .
[8] Wang-Heon Lee,et al. New Watermarking Technique Using Data Matrix and Encryption Keys , 2012 .
[9] Xingming Sun,et al. A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution , 2009 .
[10] Fei Peng,et al. Adaptive reversible data hiding scheme based on integer transform , 2012, Signal Process..
[11] I. Daubechies,et al. Wavelet Transforms That Map Integers to Integers , 1998 .
[12] Nor Ashidi Mat Isa,et al. A Steganography Approach over Video Images to Improve Security , 2015 .
[13] Rengarajan Amirtharajan,et al. Horse Riding & Hiding in Image for Data Guarding , 2012 .
[14] Po-Yueh Chen,et al. A DWT Based Approach for Image Steganography , 2006 .
[15] Cheng-Hsing Yang,et al. A data hiding scheme using the varieties of pixel-value differencing in multimedia images , 2011, J. Syst. Softw..
[16] Rengarajan Amirtharaj,et al. Comparative Analysis of (5/3) and Haar IWT Based Steganography , 2014 .
[17] Rengarajan Amirtharajan,et al. An intelligent chaotic embedding approach to enhance stego-image quality , 2012, Inf. Sci..
[18] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[19] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[20] Putra Sumari,et al. Steganography in digital images: Common approaches and tools , 2013 .
[21] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..