Steganography-Time to Time: A Review
暂无分享,去创建一个
[1] Rengarajan Amirtharaj,et al. Brownian Motion of Binary, Gray-Binary and Gray Bits in Image for Stego , 2012 .
[2] Jiaohua Qin,et al. Random Image Steganography and Steganalysis: Present Status and Future Directions , 2012 .
[3] Wojciech Mazurczyk,et al. Hiding information in a Stream Control Transmission Protocol , 2011, Comput. Commun..
[4] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[5] Zarinah Mohd Kasirun,et al. Hiding Data in Video File: An Overview , 2010 .
[6] Sorina Dumitrescu,et al. Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..
[7] Yuting Su,et al. Video steganalysis based on aliasing detection , 2008 .
[8] Guo-Shiang Lin,et al. A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.
[9] John Bosco Balaguru Rayappan,et al. Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego , 2012 .
[10] Xingming Sun,et al. A Secure Steganographic Method via Multiple Choice Questions , 2011 .
[11] Azizah Abdul Manaf,et al. High watermarking capacity based on spatial domain technique , 2011 .
[12] Yong Zhang,et al. A Blind Image Watermarking Scheme Using Fast Hadamard Transform , 2010 .
[13] Juan Li,et al. A Huffman Coding Section-based Steganography for AAC Audio , 2011 .
[14] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[15] Othman Omran Khalifa,et al. A review on multimedia communications cryptography , 2011 .
[16] Jiaohua Qin,et al. A Review on Detection of LSB Matching Steganography , 2010 .
[17] Rengarajan Amirtharaj,et al. Stego on 2n:1 Platform for Users and Embedding , 2011 .
[18] K. Thenmozhi,et al. Firmware for Data Security: A Review , 2012 .
[19] Kefa Rabah,et al. Steganography-The Art of Hiding Data , 2004 .
[20] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[21] B. B. Zaidan,et al. Secure Topology for Electronic Medical Record Transmissions , 2010 .
[22] Rengarajan Amirtharaj,et al. Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA , 2012 .
[23] Ismail Avcibas. Audio steganalysis with content-independent distortion measures , 2006, IEEE Signal Processing Letters.
[24] Xingming Sun,et al. Multi-Blogs Steganographic Algorithm Based on Directed Hamiltonian Path Selection , 2008 .
[25] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[26] Moayad A. Fadhil,et al. Arabic Text Steganography using Kashida Extensions with Huffman Code , 2010 .
[27] K. Thenmozhi,et al. OFDM+CDMA+Stego = Secure Communication: A Review , 2012 .
[28] Sajad Shirali-Shahreza,et al. High Capacity Persian/Arabic Text Steganography , 2008 .
[29] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[30] Tung-Shou Chen,et al. Blockwise Reversible Data Hiding by Contrast Mapping , 2009 .
[31] K. Thenmozhi,et al. Pixel Forefinger for Gray in Color: A Layer by Layer Stego , 2012 .
[32] Dongqing Xie,et al. A High-capacity Steganographic Scheme for 3D Point Cloud Models , 2010 .
[33] Tuomas Aura,et al. Practical Invisibility in Digital Communication , 1996, Information Hiding.
[34] Miss Laiha Mat Kiah. Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns , 2011 .
[35] Walter Bender,et al. Applications for data hiding , 2000, IBM Syst. J..
[36] Hamid A. Jalab,et al. An Overview on Hiding Information Technique in Images , 2010 .
[37] Rengarajan Amirtharajan,et al. Constructive Role of SFC & RGB Fusion versus Destructive Intrusion , 2010 .
[38] Jessica J. Fridrich,et al. Quantitative steganalysis of digital images: estimating the secret message length , 2003, Multimedia Systems.
[39] Jessica J. Fridrich,et al. Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..
[40] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[41] Rengarajan Amirtharaj,et al. Inverted Pattern in Inverted Time Domain for Icon Steganography , 2012 .
[42] Dengguo Feng,et al. Video Steganalysis Exploiting Motion Vector Reversion-Based Features , 2012, IEEE Signal Processing Letters.
[43] Ja-Chen Lin,et al. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..
[44] Zhihua Xia,et al. Steganalysis Based on Difference Statistics for LSB Matching Steganography , 2009 .
[45] Andrew D. Ker. Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.
[46] Jessica J. Fridrich,et al. New blind steganalysis and its implications , 2006, Electronic Imaging.
[47] Xingming Sun,et al. Steganography in Ms Excel Document using Text-rotation Technique , 2011 .
[48] Adnan Abdul-Aziz Gutub,et al. Pixel Indicator Technique for RGB Image Steganography , 2010 .
[49] Zhihua Xia,et al. Feature Selection for Image Steganalysis using Hybrid Genetic Algorithm , 2009 .
[50] Xingming Sun,et al. An Excellent Image Data Hiding Algorithm Based on BTC , 2011 .
[51] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[52] Rengarajan Amirtharajan,et al. An intelligent chaotic embedding approach to enhance stego-image quality , 2012, Inf. Sci..
[53] Hao Luo,et al. Joint Secret Sharing and Data Hiding for Block Truncation Coding Compressed Image Transmission , 2011 .
[54] Subariah Ibrahim,et al. Adaptive image steganography based on optimal embedding and robust against chi-square attack , 2011 .
[55] Hao Luo,et al. Reversible Data Hiding Based on Hilbert Curve Scan and Histogram Modification , 2012 .
[56] Zarinah Mohd Kasirun,et al. On the capacity and security of steganography approaches: An overview , 2010 .
[57] A. A. Zaidan,et al. On the Differences between Hiding Information and Cryptography Techniques: An Overview , 2010 .