Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors
暂无分享,去创建一个
Mohamad Khalil | Safwan El Assad | Thang Manh Hoang | Olivier Deforges | Dalia Battikh | Bassem Bakhache | S. E. Assad | B. Bakhache | T. Hoang | O. Déforges | Mohamad Khalil | Dalia Battikh
[1] Colin K. Lee. Infrared Face Recognition , 2006, Encyclopedia of Multimedia.
[2] James V. Candy,et al. Adaptive and Learning Systems for Signal Processing, Communications, and Control , 2006 .
[3] Fatema Akhter. A Novel Approach for Image Steganography in Spatial Domain , 2015, ArXiv.
[4] Rajeev Kumar,et al. A reversible high capacity data hiding scheme using pixel value adjusting feature , 2014, Multimedia Tools and Applications.
[5] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[6] A.I. Hashad,et al. A robust steganography technique using discrete cosine transform insertion , 2005, 2005 International Conference on Information and Communication Technology.
[7] Jianzhong Li,et al. An Adaptive and Secure Holographic Image Watermarking Scheme , 2019, Entropy.
[8] Olivier Déforges,et al. Fast and Secure Chaos-Based Cryptosystem for Images , 2016, Int. J. Bifurc. Chaos.
[9] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[10] Safwan El Assad,et al. Enhancement using chaos of a steganography method in DCT domain , 2015, 2015 Fifth International Conference on Digital Information and Communication Technology and its Applications (DICTAP).
[11] Mohammad Saniee Abadeh,et al. Image steganalysis using a bee colony based feature selection algorithm , 2014, Eng. Appl. Artif. Intell..
[12] Vladimir Vapnik,et al. An overview of statistical learning theory , 1999, IEEE Trans. Neural Networks.
[13] Safwan El Assad,et al. Design and efficient implementation of a chaos-based stream cipher , 2017 .
[14] Ying Wang,et al. Optimized Feature Extraction for Learning-Based Image Steganalysis , 2007, IEEE Transactions on Information Forensics and Security.
[15] Phalguni Gupta,et al. Edge-based image steganography , 2014, EURASIP J. Inf. Secur..
[16] Xing-Zhou Zhang,et al. An image encryption scheme based on new spatiotemporal chaos , 2013 .
[17] Chengyun Yang,et al. Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[18] Xiaofeng Song,et al. Steganalysis of perturbed quantization steganography based on the enhanced histogram features , 2014, Multimedia Tools and Applications.
[19] Ekta Walia,et al. An Analysis of LSB & DCT based Steganography , 2010 .
[20] Naixue Xiong,et al. Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.
[21] Patrick Siarry,et al. Differential evolution algorithm for the selection of optimal scaling factors in image watermarking , 2014, Eng. Appl. Artif. Intell..
[22] Safwan El Assad,et al. A new chaos-based image encryption system , 2016, Signal Process. Image Commun..
[23] XiongNaixue,et al. Steganalysis of LSB matching using differences between nonadjacent pixels , 2016 .
[24] Khan Muhammad,et al. A New Image Steganographic Technique using Pattern based Bits Shuffling and Magic LSB for Grayscale Images , 2016, ArXiv.
[25] Krasimir Kordov,et al. Least Significant Bit Steganography using Hitzl-Zele Chaotic Map , 2017 .
[26] Gandharba Swain,et al. Steganography using two sided, three sided, and four sided side match methods , 2013, CSI Transactions on ICT.
[27] Swathi Karri,et al. Steganographic algorithm based on randomization of DCT kernel , 2014, Multimedia Tools and Applications.
[28] Tao Zhang,et al. Improved LSB matching steganography resisting histogram attacks , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[29] A.A. Abdelwahab,et al. A discrete wavelet transform based technique for image data hiding , 2008, 2008 National Radio Science Conference.
[30] Wei Li,et al. Image steganography based on subsampling and compressive sensing , 2014, Multimedia Tools and Applications.
[31] M.-R. Akbarzadeh-T,et al. A New Genetic Algorithm Approach for Secure JPEG Steganography , 2006, 2006 IEEE International Conference on Engineering of Intelligent Systems.
[32] Ki-Hyun Jung,et al. Image Data Hiding Method Based on Multi-Pixel Differencing and LSB Substitution Methods , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.
[33] Safwan El Assad,et al. Stéganographie basée chaos pour assurer la sécurité de l'information , 2015 .
[34] Safwan El Assad,et al. Chaos Based Information Hiding and Security , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[35] Weimin Ouyang,et al. Protect fragile regions in steganography LSB embedding , 2010, 2010 Third International Symposium on Knowledge Acquisition and Modeling.
[36] Karim Faez,et al. Entropy-Based Video Steganalysis of Motion Vectors , 2018, Entropy.
[37] Mohammad Abu Taha. Real-Time and Portable Chaos-based Crypto-Compression Systems for Efficient Embedded Architectures , 2017 .
[38] R.T. McKeon,et al. Strange fourier steganography in movies , 2007, 2007 IEEE International Conference on Electro/Information Technology.
[39] Rajesh Samata,et al. An Enhanced Image Steganography Technique using DCT, Jsteg and Data Mining Bayesian Classification Algorithm , 2015 .
[40] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[41] Olivier Déforges,et al. Enhancement of two spatial steganography algorithms by using a chaotic system: Comparative analysis , 2013, 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013).
[42] Mohammad Rahmati,et al. An efficient steganographic framework based on dynamic blocking and genetic algorithm , 2014, Multimedia Tools and Applications.
[43] R. R. Sedamkar,et al. A Modified High Frequency Adaptive Security Approach using Steganography for Region Selection based on Threshold Value , 2016 .
[44] Ajit Danti,et al. Randomized Embedding Scheme Based on DCT Coefficients for Image Steganography , 2010 .
[45] Ahmed Raza Rajput,et al. Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis , 2019, Entropy.
[46] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[47] Hany Farid,et al. Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.
[48] Monika Gambhir,et al. Arnold Transform Based Steganography , 2013 .
[49] Olivier Déforges,et al. Enhanced Adaptive Data Hiding in Spatial LSB Domain by using Chaotic Sequences , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[50] M. Hwang,et al. Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .