Fast retrieval of hidden data using enhanced hidden Markov model in video steganography
暂无分享,去创建一个
[1] Gautam Sanyal,et al. Hiding & Analyzing Data in Image Using Extended PMM☆ , 2013 .
[2] Rengarajan Amirtharajan,et al. Stego on FPGA: An IWT Approach , 2014, TheScientificWorldJournal.
[3] Ashish T. Bhole,et al. Steganography over video file using Random Byte Hiding and LSB technique , 2012, 2012 IEEE International Conference on Computational Intelligence and Computing Research.
[4] B. B. Zaidan,et al. Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation , 2009, ArXiv.
[5] Henk J. A. M. Heijmans,et al. Reversible data embedding into images using wavelet techniques and sorting , 2005, IEEE Transactions on Image Processing.
[6] Patrick Bouthemy,et al. A HMM-Based Method for Recognizing Dynamic Video Contents from Trajectories , 2007, 2007 IEEE International Conference on Image Processing.
[7] Kuo-Chen Wu,et al. Exploring pixel-value differencing and base decomposition for low distortion data embedding , 2012, Appl. Soft Comput..
[8] Tamer Shanableh,et al. Data Hiding in MPEG Video Files Using Multivariate Regression and Flexible Macroblock Ordering , 2012, IEEE Transactions on Information Forensics and Security.
[9] Nicole Vincent,et al. A new way to use hidden Markov models for object tracking in video sequences , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[10] Zhang Min-qing,et al. Video steganography using motion vector components , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[11] Jessica J. Fridrich,et al. The square root law of steganographic capacity for Markov covers , 2009, Electronic Imaging.
[12] Hussein A. Aly,et al. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error , 2011, IEEE Transactions on Information Forensics and Security.
[13] Hsiang-Fu Yu,et al. A Markov-based reversible data hiding method based on histogram shifting , 2012, J. Vis. Commun. Image Represent..
[14] Azman Samsudin,et al. A formulation of conditional states on steganalysis approach , 2012 .
[15] Bin Deng,et al. Text Steganography System Using Markov Chain Source Model and DES Algorithm , 2010, J. Softw..
[16] Tie Liu. Application of Markov Chains to Analyze and Predict the Time Series , 2010 .
[17] Punam Bedi,et al. Steganalysis for JPEG Images Using Extreme Learning Machine , 2013, 2013 IEEE International Conference on Systems, Man, and Cybernetics.
[18] Yu Li,et al. A new method of data hiding based on H.264 encoded video sequences , 2010, IEEE 10th INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS.
[19] Tung-Shou Chen,et al. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching , 2012, IEEE Transactions on Information Forensics and Security.
[20] Chin-Chen Chang,et al. A reversible data embedding scheme based on Chinese remainder theorem for VQ index tables , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.
[21] Kevin Curran,et al. Skin tone based Steganography in video files exploiting the YCbCr colour space , 2008, 2008 IEEE International Conference on Multimedia and Expo.
[22] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[23] Sakir Sezer,et al. Video steganalysis of LSB based motion vector steganography , 2013, European Workshop on Visual Information Processing (EUVIP).
[24] V. Sathya,et al. Data hiding in audio signal, video signal text and JPEG images , 2012, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012).
[25] Zhu Li,et al. A Detection Method Research for Data Hiding Based on Markov Chain , 2011, 2011 International Conference on Computational and Information Sciences.
[26] Ming Li,et al. Extracting Spread-Spectrum Hidden Data From Digital Media , 2013, IEEE Transactions on Information Forensics and Security.
[27] A.A. Hanafy,et al. A secure covert communication model based on video steganography , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.