Block-Based Steganographic Algorithm Using Modulus Function and Pixel-Value Differencing
暂无分享,去创建一个
[1] Khalid A. Darabkh. Queuing Analysis and Simulation of Wireless Access and End Point Systems using Fano Decoding , 2010, J. Commun..
[2] Khalid A. Darabkh,et al. A generic buffer occupancy expression for stop-and-wait hybrid automatic repeat request protocol over unstable channels , 2016, Telecommun. Syst..
[3] Khalid A. Darabkh,et al. Performance Evaluation of Sequential Decoding System for UDP-Based Systems for Wireless Multimedia Networks , 2006, ICWN.
[4] Karim Faez,et al. New adaptive steganographic method using least significant- bit substitution and pixel-value differencing , 2012 .
[5] Khalid A. Darabkh,et al. Stationary queue-size distribution for variable complexity sequential decoders with large timeout , 2006, ACM-SE 44.
[6] D. Artz,et al. Digital steganography: hiding data within data , 2001 .
[7] Arvind Kumar,et al. Steganography- A Data Hiding Technique , 2010 .
[8] Khalid A. Darabkh,et al. An improved reversible data hiding algorithm based on modification of prediction errors , 2014, Digital Image Processing.
[9] El-Sayed M. El-Alfy,et al. High-Capacity Image Steganography Based on Overlapped Pixel Differences and Modulus Function , 2012, NDT.
[10] Khalid A. Darabkh,et al. A New Image Steganographic Approach for Secure Communication Based on LSB Replacement Method , 2015, Inf. Technol. Control..
[11] Edward J. Delp,et al. A Review of Data Hiding in Digital Images , 1999, PICS.
[12] Khalid A. Darabkh. Fast and upper bounded Fano decoding algorithm: queuing analysis , 2017, Trans. Emerg. Telecommun. Technol..
[13] Tung-Shou Chen,et al. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching , 2012, IEEE Transactions on Information Forensics and Security.
[14] Kamaldeep Joshi,et al. A Review on Different Image Steganography Techniques , 2016 .
[15] Abdelrahman Desoky. Noiseless Steganography: The Key to Covert Communications , 2012 .
[16] Khalid A. Darabkh,et al. Markov-Based Distributed Approach for Mitigating Self-Coexistence Problem in IEEE 802.22 WRANs , 2014, Comput. J..
[17] Khalid A. Darabkh,et al. LEACH enhancements for wireless sensor networks based on energy model , 2014, 2014 IEEE 11th International Multi-Conference on Systems, Signals & Devices (SSD14).
[18] Khalid A. Darabkh,et al. Efficient Improvements on the BDND Filtering Algorithm for the Removal of High-Density Impulse Noise , 2013, IEEE Transactions on Image Processing.
[19] Nasir D. Memon,et al. Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.
[20] Khalid A. Darabkh,et al. A Rule-Based Fuzzy Inference System for Adaptive Image Contrast Enhancement , 2012, Comput. J..
[21] Gheith A. Abandah,et al. An improved queuing model for packet retransmission policy and variable latency decoders , 2012, IET Commun..
[22] Jeanne Chen,et al. A PVD-based data hiding method with histogram preserving using pixel pair matching , 2014, Signal Process. Image Commun..
[23] Khalid A. Darabkh,et al. N-BEB: New backoff algorithm for IEEE 802.11 MAC protocol , 2014, 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[24] Khalid A. Darabkh,et al. TCP Traffic Control Evaluation and Reduction over Wireless Networks Using Parallel Sequential Decoding Mechanism , 2007, EURASIP J. Wirel. Commun. Netw..
[25] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[26] Khalid A. Darabkh,et al. Efficient Reversible Data Hiding Using Multiple Predictors , 2016, Comput. J..
[27] Khalid A. Darabkh. A New Steganographic Algorithm Based on Multi Directional PVD and Modified LSB , 2017, Inf. Technol. Control..
[28] Guillermo Sapiro,et al. Is image steganography natural? , 2005, IEEE Transactions on Image Processing.
[29] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[30] Khalid A. Darabkh,et al. Efficient DTW-Based Speech Recognition System for Isolated Words of Arabic Language , 2013 .
[31] Khalid A. Darabkh,et al. Improved clustering algorithms for target tracking in wireless sensor networks , 2017, The Journal of Supercomputing.
[32] Khalid A. Darabkh,et al. New video discarding policies for improving UDP performance over wired/wireless networks , 2015, Int. J. Netw. Manag..
[33] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[34] Khalid A. Darabkh. Imperceptible and Robust DWT-SVD-Based Digital Audio Watermarking Algorithm , 2014 .
[35] Khalid A. Darabkh. Evaluation of channel adaptive access point systemwith Fano decoding , 2011, Int. J. Comput. Math..
[36] Suvamoy Changder,et al. A secure image steganography technique with moderately higher significant bit embedding , 2014, 2014 International Conference on Computer Communication and Informatics.
[37] Khalid A. Darabkh,et al. SARDH: A novel sharpening-aware reversible data hiding algorithm , 2016, J. Vis. Commun. Image Represent..
[38] I. Jafar. Image Contrast Enhancement Based on Equalization of Edge Histograms , 2022 .
[39] Khalid A. Darabkh,et al. An improved image least significant bit replacement method , 2014, 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[40] Khalid A. Darabkh,et al. Efficient PFD-Based Networking and Buffering Models for Improving Video Quality over Congested Links , 2014, Wirel. Pers. Commun..
[41] Kefa Rabah,et al. Steganography-The Art of Hiding Data , 2004 .
[42] Chin-Feng Lee,et al. A novel data hiding scheme based on modulus function , 2010, J. Syst. Softw..
[43] Khalid A. Darabkh,et al. Intelligent and Selective Video Frames Discarding Policies for Improving Video Quality over Wired/Wireless Networks , 2013, 2013 IEEE International Symposium on Multimedia.
[44] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[45] Khalid A. Darabkh,et al. Dynamic resource allocation using load estimation in distributed cognitive radio systems , 2015 .
[46] Khalid A. Darabkh,et al. Improving UDP performance using intermediate QoD-aware hop system for wired/wireless multimedia communication systems , 2011, Int. J. Netw. Manag..
[47] Min-Shiang Hwang,et al. A high quality steganographic method with pixel-value differencing and modulus function , 2008, J. Syst. Softw..
[48] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[49] Khalid A. Darabkh,et al. An efficient reversible data hiding algorithm using two steganographic images , 2016, Signal Process..
[50] Khalid A. Darabkh,et al. Packet Recycling and Delayed ACK for Improving the Performance of TCP over MANETs , 2014, Wirel. Pers. Commun..
[51] Khalid A. Darabkh,et al. A modified unsharp-masking technique for image contrast enhancement , 2011, Eighth International Multi-Conference on Systems, Signals & Devices.
[52] Mehrdad Jalali,et al. Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function , 2014, Egyptian Informatics Journal.
[53] Khalid A. Darabkh,et al. Incorporating automatic repeat request and thresholds with variable complexity decoding algorithms over wireless networks: queuing analysis , 2011, IET Commun..
[54] Anuja Arora,et al. Performance evaluation of LSB and LSD in steganography , 2014, 2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence).
[55] Khalid A. Darabkh,et al. Performance evaluation of multiuser diversity in multiuser two‐hop cooperative multi‐relay wireless networks using maximal ratio combining over Rayleigh fading channels , 2015, Int. J. Commun. Syst..
[56] Heung-Kyu Lee,et al. Improved Steganographic Method Preserving Pixel-Value Differencing Histogram with Modulus Function , 2010, EURASIP J. Adv. Signal Process..
[57] El-Sayed M. El-Alfy,et al. A comparative study of PVD-based schemes for data hiding in digital images , 2011, 2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA).
[58] Chin-Chen Chang,et al. Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing , 2006, Fundam. Informaticae.
[59] Khalid A. Darabkh,et al. Static Clustering for Target Tracking in Wireless Sensor Networks , 2015 .
[60] Khalid A. Darabkh,et al. A Yet Efficient Communication System with Hearing-Impaired People Based on Isolated Words of Arabic Language , 2013 .
[61] Khalid A. Darabkh,et al. A Self-Learning MAC Protocol for Energy Harvesting and Spectrum Access in Cognitive Radio Sensor Networks , 2016, J. Sensors.
[62] Khalid A. Darabkh,et al. Novel Protocols for Improving the Performance of ODMRP and EODMRP over Mobile Ad Hoc Networks , 2015, Int. J. Distributed Sens. Networks.
[63] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[64] Khalid A. Darabkh,et al. Hierarchical clustering using genetic algorithm in wireless sensor networks , 2013, 2013 36th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[65] M. Hwang,et al. Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .