Efficient Approach of Image Hiding
暂无分享,去创建一个
[1] Md Rashedul Islam,et al. An efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography , 2014, 2014 International Conference on Informatics, Electronics & Vision (ICIEV).
[2] S Mrs.Anuja. A Secure Image Steganography based on RSA Algorithm and Hash-LSB Technique , 2018 .
[3] Safya Belghith,et al. A novel image encryption scheme based on substitution-permutation network and chaos , 2016, Signal Process..
[4] Sattar Mirzakuchaki,et al. Breaking an image encryption algorithm based on the new substitution stage with chaotic functions , 2016 .
[5] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[6] Shoaib Ansari,et al. An Image Encryption Approach Using Chaotic Map in Frequency Domain , 2012 .
[7] Mukesh Kumar,et al. Design and analysis of Compress-Encrypt-Stego technique for steganography , 2013, 2013 IEEE International Conference in MOOC, Innovation and Technology in Education (MITE).
[8] Hai Yu,et al. A Chaotic Image Encryption Scheme Based on Magic Cube Transformation , 2011, 2011 Fourth International Workshop on Chaos-Fractals Theories and Applications.
[9] Amir-Masoud Eftekhari-Moghadam,et al. An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method , 2015, Appl. Soft Comput..
[10] Hadi Hajilar Lahrod,et al. A New Method for Encrypting Digital Data Using Symmetric Key in Information Exchange Spaces , 2016 .
[11] Tomás Pevný,et al. From Blind to Quantitative Steganalysis , 2009, IEEE Transactions on Information Forensics and Security.
[12] Mehrzad Khaki Jamei,et al. A secure image encryption method based on dynamic harmony search (DHS) combined with chaotic map , 2016 .
[13] Zhenjun Tang,et al. Multiple-image encryption with bit-plane decomposition and chaotic maps , 2016 .
[14] Kehui Sun,et al. A fast image encryption algorithm based on chaotic map , 2016 .
[15] Shang-Juh Kao,et al. A high quality image sharing with steganography and adaptive authentication scheme , 2011, J. Syst. Softw..
[16] Shaveta Mahajan,et al. A Review of Methods and Approach for Secure Stegnography , 2012 .
[17] Mohammad Tahghighi Sharabyan,et al. A NEW COMBINED METHOD WITH HIGH SECURITY FOR DIGITAL IMAGES STEGANOGRAPHY BASED ON IMPERIALIST COMPETITIVE ALGORITHM AND SYMMETRIC ENCRYPTION ALGORITHM , 2018 .
[18] S. Hemalatha,et al. Comparison of secure and high capacity color image steganography techniques in RGB and YCbCr domains , 2013, ArXiv.
[20] G. R. Suryawanshi. Analysis of Effect of Spatial Domain Steganography Technique on DCT Domain using Statistical Features for Digital Images , 2018 .