Mojette (d) Secret Image "SEDIH" in an Encrypted Double Image - A Histo Approach
暂无分享,去创建一个
Rengarajan Amirtharajan | Padmapriya Praveenkumar | John Bosco Balaguru Rayappan | Karuppusamy Thenmozhi | P. Praveenkumar | J. Rayappan | K. Thenmozhi | Rengarajan Amirtharajan
[1] S. A. Seyyedi,et al. A Secure Steganography Method Based on Integer Lifting Wavelet Transform , 2016, Int. J. Netw. Secur..
[2] Kuo-Liang Chung,et al. Distortion reduction for histogram modification-based reversible data hiding , 2012, Appl. Math. Comput..
[3] K. L. Shunmuganathan,et al. A reversible high embedding capacity data hiding technique for hiding secret data in images , 2010, ArXiv.
[4] Jeanpierre V. Guedon,et al. Mojette transform: applications for image analysis and coding , 1997, Electronic Imaging.
[5] P.D.Ratna Raju,et al. Binary Tree Approach for Data Hiding Based on Histogram Modification , 2010 .
[6] Chin-Chen Chang,et al. Multi-dimensional and Multi-level Histogram-Shifting-Imitated Reversible Data Hiding Scheme , 2013 .
[7] Shekhar Chandra,et al. Direct inversion of Mojette projections , 2013, 2013 IEEE International Conference on Image Processing.
[8] Xiaolong Li,et al. A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding , 2014, Signal Process..
[9] Jean-Pierre V. Guédon,et al. Validation of Mojette reconstruction from Radon acquisitions , 2013, 2013 IEEE International Conference on Image Processing.
[10] Masoud Nosrati. Reversible Data Hiding : Principles , Techniques , and Recent Studies , 2002 .
[11] Simying Ong,et al. An enhanced mechanism for image steganography using sequential colour cycle algorithm , 2013, Int. Arab J. Inf. Technol..
[12] Vasuki Arumugam,et al. Lossless data hiding based on histogram modification , 2012, Int. Arab J. Inf. Technol..
[13] Jeng-Shyang Pan,et al. Reversible data hiding based on multilevel histogram modification and sequential recovery , 2011 .
[14] Nicolas Normand,et al. A Geometry Driven Reconstruction Algorithm for the Mojette Transform , 2006, DGCI.
[15] K. Muneeswaran,et al. Hiding of Confidential Data in Spatial Domain Images using Image Interpolation , 2015, Int. J. Netw. Secur..
[16] Chin-Chen Chang,et al. Reversible Data Hiding Based on Histogram Modification of Pixel Differences , 2009, IEEE Transactions on Circuits and Systems for Video Technology.
[17] H. T. Panduranga,et al. Hybrid approach for dual image encryption using nibble exchange and Hill-cipher , 2012, 2012 International Conference on Machine Vision and Image Processing (MVIP).
[18] Sushanta Biswas,et al. Semi Random Position Based Steganography for Resisting Statistical Steganalysis , 2015, Int. J. Netw. Secur..
[19] Hakan Isik,et al. A Huffman compression based text steganography method , 2012, Multimedia Tools and Applications.
[20] A. Murat Tekalp,et al. Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.
[21] Navnath S. Narawade,et al. Forward Modified Histogram Shifting Based Reversible Watermarking with Reduced Pixel Shifting and High Embedding Capacity , 2012 .
[22] Hae-Yeoun Lee,et al. Reversible data hiding exploiting spatial correlation between sub-sampled images , 2009, Pattern Recognit..
[23] Florent Autrusseau,et al. Lossless image compression via predictive coding of discrete Radon projections , 2008, Signal Process. Image Commun..
[24] Marc Chaumont,et al. A reversible data hiding method for encrypted images , 2008, Electronic Imaging.