Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images
暂无分享,去创建一个
Ainuddin Wahid Abdul Wahab | Ki-Hyun Jung | Noman Javed | Mehdi Hussain | A. W. Wahab | K. Jung | M. Hussain | Noman Javed
[1] Lihong Huang,et al. A novel data hiding for color images based on pixel value difference and modulus function , 2014, Multimedia Tools and Applications.
[2] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[3] Naixue Xiong,et al. Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information , 2015, Symmetry.
[4] Ali Hamzeh,et al. A novel steganalysis for TPVD steganographic method based on differences of pixel difference histogram , 2010, Multimedia Tools and Applications.
[5] Hsiao-Shan Huang,et al. A combined image steganographic method using multi-way pixel-value differencing , 2015, International Conference on Graphic and Image Processing.
[6] Chun-I Fan,et al. Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security , 2015, Symmetry.
[7] Ki-Hyun Jung,et al. High-capacity steganographic method based on pixel-value differencing and LSB replacement methods , 2010 .
[8] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[9] Ki-Hyun Jung,et al. Image Data Hiding Method Based on Multi-Pixel Differencing and LSB Substitution Methods , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.
[10] Karim Faez,et al. New adaptive steganographic method using least significant- bit substitution and pixel-value differencing , 2012 .
[11] Ingemar J. Cox,et al. Steganalysis for LSB Matching in Images with High-frequency Noise , 2007, 2007 IEEE 9th Workshop on Multimedia Signal Processing.
[12] Lih-Chyau Wuu,et al. Multi-Bit Data Hiding Scheme for Compressing Secret Messages , 2015 .
[13] C. Ern. Information hiding techniques for steganography and digital watermarking , 2018 .
[14] Chin-Chen Chang,et al. A novel multi-group exploiting modification direction method based on switch map , 2012, Signal Process..
[15] S. Selvakumar,et al. High payload image steganography with reduced distortion using octonary pixel pairing scheme , 2013, Multimedia Tools and Applications.
[16] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[17] Ross J. Anderson,et al. Evaluation of copyright marking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[18] Cheonshik Kim,et al. Data hiding by an improved exploiting modification direction , 2012, Multimedia Tools and Applications.
[19] Hedieh Sajedi,et al. HYSA: HYbrid steganographic approach using multiple steganography methods , 2011, Secur. Commun. Networks.
[20] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[21] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[22] Vijay H. Mankar,et al. Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..
[23] Jessica J. Fridrich,et al. Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model , 2015, Electronic Imaging.
[24] Chi-Yao Weng,et al. Steganographic access control in data hiding using run-length encoding and modulo-operations , 2016, Secur. Commun. Networks.
[25] Hayat Al-Dmour,et al. Quality optimized medical image information hiding algorithm that employs edge detection and data coding , 2016, Comput. Methods Programs Biomed..
[26] Saraju P. Mohanty,et al. Hardware assisted watermarking for multimedia , 2009, Comput. Electr. Eng..
[27] Xinpeng Zhang,et al. Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.
[28] T-S Chen,et al. A high payload hybrid data hiding scheme with LSB, EMD and MPE , 2015 .
[29] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[30] Sos S. Agaian,et al. Taxonomy for spatial domain LSB steganography techniques , 2014, Sensing Technologies + Applications.
[31] Chien-Ping Chang,et al. High-payload image hiding with quality recovery using tri-way pixel-value differencing , 2012, Inf. Sci..
[32] Yuan-Yu Tsai,et al. Exploring LSB Substitution and Pixel-value Differencing for Block-based Adaptive Data Hiding , 2014, Int. J. Netw. Secur..
[33] Cheng-Hsing Yang,et al. Varied PVD + LSB evading detection programs to spatial domain in data embedding systems , 2010, J. Syst. Softw..
[34] Xingming Sun,et al. A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution , 2009 .
[35] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[36] Jessica J. Fridrich,et al. Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.
[37] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[38] A. Bovik,et al. A universal image quality index , 2002, IEEE Signal Processing Letters.
[39] Li-Hong Huang,et al. A data hiding scheme using pixel value differencing and improving exploiting modification directions , 2015, Comput. Secur..
[40] Lionel Fillatre. Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images , 2012, IEEE Transactions on Signal Processing.
[41] M. Hwang,et al. Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .