Optimum Pixel & Bit location for Colour Image Stego- A Distortion Resistant Approach
暂无分享,去创建一个
[1] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[2] Rengarajan Amirtharajan,et al. Colour Guided Colour Image Steganography , 2010, ArXiv.
[3] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[4] R. Akila,et al. A Comparative Analysis of Image Steganography , 2010 .
[5] Chin-Chen Chang,et al. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..
[6] Peter Jorgensen,et al. Applied cryptography: Protocols, algorithm, and source code in C: By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN 0-471-59756-2 , 1996 .
[7] Chin-Chen Chang,et al. A steganographic method for digital images using side match , 2004, Pattern Recognit. Lett..
[8] Adnan Abdul-Aziz Gutub,et al. Pixel Indicator High Capacity Technique for RGB Image Based Steganography , 2008 .
[9] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[10] Peter Wayner,et al. Disappearing Cryptography: Information Hiding: Steganography and Watermarking , 2008 .
[11] Po-Yueh Chen,et al. A DWT Based Approach for Image Steganography , 2006 .
[12] Ja-Chen Lin,et al. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..
[13] R. Amirtharajan,et al. Tri-layer stego for enhanced security - a keyless random approach , 2009, 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA).
[14] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[15] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..
[16] Peter Wayner,et al. Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition) , 2002 .
[17] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[18] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..