Generating facial images for steganography based on IGA and image morphing
暂无分享,去创建一个
[1] Peter Wayner,et al. Disappearing Cryptography: Information Hiding: Steganography and Watermarking , 2008 .
[2] Cheng-Hsiung Hsieh,et al. A new protocol for user awareness in card based shopping , 2010, 2010 2nd International Symposium on Aware Computing.
[3] Cheng-Hsiung Hsieh,et al. Card user awareness based on linear sub-space representation , 2011, 2011 IEEE International Conference on Systems, Man, and Cybernetics.
[4] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[5] Cheng-Hsiung Hsieh,et al. Card user authentication based on generalized image morphing , 2011, 2011 3rd International Conference on Awareness Science and Technology (iCAST).
[6] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[7] Christopher D. Watkins,et al. Modern image processing - warping, morphing, and classical techniques , 1993 .
[8] M Steyvers,et al. Morphing techniques for manipulating face images , 1999, Behavior research methods, instruments, & computers : a journal of the Psychonomic Society, Inc.
[9] Satoshi Kondo,et al. A Novel Steganographic Technique Based on Image Morphing , 2006, UIC.
[10] R. Storn,et al. Differential Evolution: A Practical Approach to Global Optimization (Natural Computing Series) , 2005 .