Image steganography using uncorrelated color space and its application for security of visual contents in online social networks
暂无分享,去创建一个
Sung Wook Baik | Khan Muhammad | Muhammad Sajjad | Seungmin Rho | Irfan Mehmood | Khan Muhammad | I. Mehmood | M. Sajjad | S. Baik | Seungmin Rho
[1] Sung Wook Baik,et al. A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image , 2015, Multimedia Tools and Applications.
[2] Millie Pant,et al. An image watermarking scheme in wavelet domain with optimized compensation of singular value decomposition via artificial bee colony , 2015, Inf. Sci..
[3] Mohammad Rahmati,et al. Adaptive image steganography using contourlet transform , 2013, J. Electronic Imaging.
[4] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[5] Chang-Chou Lin,et al. Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..
[6] Naixue Xiong,et al. Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.
[7] Wei-Chung Cheng,et al. Chromatic encoding: a low power encoding technique for digital visual interface , 2004, IEEE Transactions on Consumer Electronics.
[8] Weiming Zhang,et al. A Double Layered “Plus-Minus One” Data Embedding Scheme , 2007, IEEE Signal Processing Letters.
[9] Chin-Chen Chang,et al. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..
[10] Iqtadar Hussain,et al. A technique for digital steganography using chaotic maps , 2014 .
[11] Yuhui Zheng,et al. Image segmentation by generalized hierarchical fuzzy C-means algorithm , 2015, J. Intell. Fuzzy Syst..
[12] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..
[13] François Cayre,et al. Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding , 2008, IEEE Transactions on Information Forensics and Security.
[14] Shahrokh Ghaemmaghami,et al. Colour image steganography method based on sparse representation , 2015, IET Image Process..
[15] Yuguang Fang,et al. Privacy and security for online social networks: challenges and opportunities , 2010, IEEE Network.
[16] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[17] Wojciech Mazurczyk,et al. Steganography in Modern Smartphones and Mitigation Techniques , 2014, IEEE Communications Surveys & Tutorials.
[18] Sung Wook Baik,et al. Efficient visual attention based framework for extracting key frames from videos , 2013, Signal Process. Image Commun..
[19] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[20] George Stephanides,et al. A novel technique for image steganography based on a high payload method and edge detection , 2012, Expert Syst. Appl..
[21] Jiachen Yang,et al. Quality Index for Stereoscopic Images by Separately Evaluating Adding and Subtracting , 2015, PloS one.
[22] Sung Wook Baik,et al. Ontology-based Secure Retrieval of Semantically Significant Visual Contents , 2015, ArXiv.
[23] Wisnu Jatmiko,et al. The Effect of Electrocardiogram Signal Compression Using Beat Reordering and SPIHT on Automatic Sleep Stage Classification , 2012 .
[24] Cheng-Hsing Yang,et al. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.
[25] Kevin Curran,et al. An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.
[26] Yun Q. Shi,et al. Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[27] Sung Wook Baik,et al. Visual saliency models for summarization of diagnostic hysteroscopy videos in healthcare systems , 2016, SpringerPlus.
[28] Yan Zheng,et al. Anonymous Authentication for Trustworthy Pervasive Social Networking , 2015, IEEE Transactions on Computational Social Systems.
[29] Ja-Chen Lin,et al. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..
[30] Der-Chyuan Lou,et al. Steganographic Method for Secure Communications , 2002, Comput. Secur..
[31] Sung Wook Baik,et al. A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption , 2015, KSII Trans. Internet Inf. Syst..
[32] Chin-Chen Chang,et al. High payload steganography mechanism using hybrid edge detector , 2010, Expert Syst. Appl..
[33] Rafik Hamza,et al. A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map , 2016, Inf. Secur. J. A Glob. Perspect..
[34] Erkki Oja,et al. PicSOM - content-based image retrieval with self-organizing maps , 2000, Pattern Recognit. Lett..
[35] Bin Li,et al. Investigation on Cost Assignment in Spatial Image Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[36] Jing Wang,et al. Authentication and recovery algorithm for speech signal based on digital watermarking , 2016, Signal Process..
[37] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[38] Javaid A. Sheikh,et al. Data hiding in scrambled images: A new double layer security data hiding technique , 2014, Comput. Electr. Eng..
[39] Ramadhan J. Mstafa,et al. A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes , 2015, Multimedia Tools and Applications.
[40] Sung Wook Baik,et al. Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy , 2016, Journal of Medical Systems.
[41] Hamidreza Rashidy Kanan,et al. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm , 2014, Expert Syst. Appl..
[42] Tieyong Zeng,et al. A Generalization of LSB Matching , 2009, IEEE Signal Processing Letters.
[43] Bin Li,et al. A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.
[44] Sung Wook Baik,et al. Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices , 2017, Multimedia Tools and Applications.
[45] Khan Muhammad,et al. A Novel Image Steganographic Approach for Hiding Text in Color Images using HSI Color Model , 2015, ArXiv.
[46] M. Hwang,et al. Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .
[47] Asifullah Khan,et al. A recent survey of reversible watermarking techniques , 2014, Inf. Sci..
[48] Sorina Dumitrescu,et al. Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..
[49] Reza Safabakhsh,et al. A new steganography method which preserves histogram: Generalization of LSB++ , 2014, Inf. Sci..
[50] Gang Chen,et al. Color Image Analysis by Quaternion-Type Moments , 2014, Journal of Mathematical Imaging and Vision.
[51] Sung Wook Baik,et al. Mobile-Cloud Assisted Video Summarization Framework for Efficient Management of Remote Sensing Data Generated by Wireless Capsule Sensors , 2014, Sensors.
[52] Sung Wook Baik,et al. Sparse Representations-Based Super-Resolution of Key-Frames Extracted from Frames-Sequences Generated by a Visual Sensor Network , 2014, Sensors.
[53] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[54] Khan Muhammad,et al. CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method , 2017, Multimedia Tools and Applications.
[55] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[56] Muhammad Ghulam,et al. Detection of Voice Pathology using Fractal Dimension in a Multiresolution Analysis of Normal and Disordered Speech Signals , 2015, Journal of Medical Systems.
[57] Sung Wook Baik,et al. Evaluating the Suitability of Color Spaces for Image Steganography and Its Application in Wireless Capsule Endoscopy , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).