A Systematic Review of Computational Image Steganography Approaches
暂无分享,去创建一个
[1] Sandeep Saini,et al. Stock values predictions using deep learning based hybrid models , 2021, CAAI Trans. Intell. Technol..
[2] Rui Chen,et al. Image-denoising algorithm based on improved K-singular value decomposition and atom optimization , 2021, CAAI Trans. Intell. Technol..
[3] Jun Liu,et al. A spatial attentive and temporal dilated (SATD) GCN for skeleton-based action recognition , 2021, CAAI Trans. Intell. Technol..
[4] I. Pustokhina,et al. Blockchain-based secure data sharing scheme using image steganography and encryption techniques for telemedicine applications , 2022, Wearable Telemedicine Technology for the Healthcare Industry.
[5] Guohui Wang,et al. Stud Pose Detection Based on Photometric Stereo and Lightweight YOLOv4 , 2021, Journal of Artificial Intelligence and Technology.
[6] Bo Li,et al. UAV maneuvering decision -making algorithm based on Twin Delayed Deep Deterministic Policy Gradient Algorithm , 2021, Journal of Artificial Intelligence and Technology.
[7] Prem Kumar Singh. Data with Non-Euclidean Geometry and its Characterization , 2021, Journal of Artificial Intelligence and Technology.
[8] N. Ajlouni,et al. A Novel and Robust Hybrid Blockchain and Steganography Scheme , 2021, Applied Sciences.
[9] Mohammad R. Khosravi,et al. An Intelligent Session Key-Based Hybrid Lightweight Image Encryption Algorithm Using Logistic-Tent Map and Crossover Operator for Internet of Multimedia Things , 2021, Wireless Personal Communications.
[10] Amit Kumar Bairwa,et al. Dingo Optimizer: A Nature-Inspired Metaheuristic Approach for Engineering Problems , 2021 .
[11] Dilbag Singh,et al. Data Clustering Using Moth-Flame Optimization Algorithm , 2021, Sensors.
[12] Ching-Chun Chang,et al. Blockchain-Based Reversible Data Hiding for Securing Medical Images , 2021, Journal of healthcare engineering.
[13] Vipul Mishra,et al. Two-Way Feature Extraction Using Sequential and Multimodal Approach for Hateful Meme Classification , 2021, Complex..
[14] K. Manikandan,et al. Implementation of Least Significant Bit Image Steganography with Advanced Encryption Standard , 2021, 2021 International Conference on Emerging Smart Computing and Informatics (ESCI).
[15] A. A. Zaidan,et al. PSO–Blockchain-based image steganography: towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence architecture , 2021, Multimedia Tools and Applications.
[16] Maede Ashouri-Talouki,et al. Blockchain for steganography: advantages, new algorithms and open challenges , 2021, 2021 18th International ISC Conference on Information Security and Cryptology (ISCISC).
[17] Ashraf AbdelRaouf,et al. A new data hiding approach for image steganography based on visual color sensitivity , 2021, Multim. Tools Appl..
[18] Yuan Liu,et al. JPEG image steganography payload location based on optimal estimation of cover co-frequency sub-image , 2021, EURASIP J. Image Video Process..
[19] Neha Sharma,et al. An enhanced Huffman-PSO based image optimization algorithm for image steganography , 2021, Genet. Program. Evolvable Mach..
[20] Kamlesh Gupta,et al. Session key based fast, secure and lightweight image encryption algorithm , 2020, Multimedia Tools and Applications.
[21] Hari Mohan Pandey. Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography , 2020, Future Gener. Comput. Syst..
[22] Joseph Bamidele Awotunde,et al. A safe and secured iris template using steganography and cryptography , 2020, Multimedia Tools and Applications.
[23] Bassem Abd-El-Atty,et al. A Robust Quasi-Quantum Walks-based Steganography Protocol for Secure Transmission of Images on Cloud-based E-healthcare Platforms , 2020, Sensors.
[24] Adnan Abdul-Aziz Gutub,et al. Efficient Implementation of Multi-image Secret Hiding Based on LSB and DWT Steganography Comparisons , 2020 .
[25] R. Parvaz,et al. 2D Hybrid chaos map for image security transform based on framelet and cellular automata , 2018, Inf. Sci..
[26] P. Santhanam,et al. Effect of Immobilized Nitrifying Bacterial Consortium on Ammonia Biodegradation in Aquaculture Pond and Enhanced Growth of Labeo rohita: An In Vitro and In Vivo Studies , 2020, Arabian Journal for Science and Engineering.
[27] Guorui Feng,et al. Broadcasting Steganography in the Blockchain , 2019, IWDW.
[28] Wassim Alexan,et al. 3D Image Steganography Using Sine Logistic Map and 2D Hyperchaotic Map , 2019, 2019 International Conference on Electrical and Computing Technologies and Applications (ICECTA).
[29] Akbari Indra Basuki,et al. Joint Transaction-Image Steganography for High Capacity Covert Communication , 2019, 2019 International Conference on Computer, Control, Informatics and its Applications (IC3INA).
[30] Sajjad Shaukat Jamal,et al. A robust steganographic technique based on improved chaotic-range systems , 2019, Chinese Journal of Physics.
[31] Priti Maheshwary,et al. Fast and Secure Medical Image Encryption Based on Non Linear 4D Logistic Map and DNA Sequences (NL4DLM_DNA) , 2019, Journal of Medical Systems.
[32] R. Logesh,et al. SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images , 2019, Measurement.
[33] B. B. Zaidan,et al. Based Medical Systems for Patient’s Authentication: Towards a New Verification Secure Framework Using CIA Standard , 2019, Journal of Medical Systems.
[34] Yasir Ahmed Hamza,et al. Highly secure image steganography approach using Arnold's Cat map and maximum image entropy , 2019, ICICT '19.
[35] Peter James Vial,et al. Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research , 2019, Neurocomputing.
[36] P. Nithyanandam,et al. Secured Reversible matrix embedding based on dual image using Integer wavelet and Arnold Transform , 2019, Procedia Computer Science.
[37] Sumit Kumar Mahana,et al. Image Steganography: Analysis & Evaluation of Secret Communication , 2019, SSRN Electronic Journal.
[38] Dharmendra G. Bhatti,et al. Research Review on Digital Image Steganography Which Resists Against Compression , 2018, Advances in Intelligent Systems and Computing.
[39] Kapil Sharma,et al. Robust stego-key directed LSB substitution scheme based upon cuckoo search and chaotic map , 2018, Optik.
[40] A. K. Pal,et al. Logistic Map-Based Image Steganography Scheme Using Combined LSB and PVD for Security Enhancement , 2018, Advances in Intelligent Systems and Computing.
[41] Ainuddin Wahid Abdul Wahab,et al. Image steganography in spatial domain: A survey , 2018, Signal Process. Image Commun..
[42] G H Ghazia,et al. An Enhanced Biometric Information Security System Using Orthogonal Codes and LSB Steganography , 2018, 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT).
[43] R. Latha,et al. An Efficient Wavelet Transform Based Steganography Technique Using Chaotic Map , 2018, 2018 International Conference on Current Trends towards Converging Technologies (ICCTCT).
[44] Awais Ahmad,et al. An adaptive hybrid fuzzy-wavelet approach for image steganography using bit reduction and pixel adjustment , 2018, Soft Comput..
[45] Mohd Shafry Mohd Rahim,et al. A review and open issues of multifarious image steganography techniques in spatial domain , 2018 .
[46] Sambit Bakshi,et al. A Framework for Pixel Intensity Modulation Based Image Steganography , 2018 .
[47] R. S. Bichkar,et al. A Secure Spatial Domain Image Steganography Using Genetic Algorithm and Linear Congruential Generator , 2018 .
[48] Mohiul Islam,et al. Neural network based robust image watermarking technique in LWT domain , 2018, J. Intell. Fuzzy Syst..
[49] José Raymundo Marcial-Romero,et al. A New Optimization Strategy for Solving the Fall-Off Boundary Value Problem in Pixel-Value Differencing Steganography , 2018, Int. J. Pattern Recognit. Artif. Intell..
[50] W. Gao,et al. Sparse recovery based reversible data hiding method using the human visual system , 2018, Multimedia tools and applications.
[51] Talal Al-Kharobi,et al. Cryptography and Steganography: New Approach , 2017 .
[52] Hussain Nyeem,et al. Reversible data hiding with image bit-plane slicing , 2017, 2017 20th International Conference of Computer and Information Technology (ICCIT).
[53] Karim Faez,et al. Adaptive image steganography based on transform domain via genetic algorithm , 2017 .
[54] Vijay Kumar,et al. A modified DWT-based image steganography technique , 2017, Multimedia Tools and Applications.
[55] Peyman Ayubi,et al. A new transform domain steganography based on modified logistic chaotic map for color images , 2017, J. Inf. Secur. Appl..
[56] Yazan Aljeroudi,et al. Extreme learning machine based optimal embedding location finder for image steganography , 2017, PloS one.
[57] Xing Zhang,et al. Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting , 2017, IEEE Transactions on Cybernetics.
[58] Mamta Juneja,et al. Adaptive Block Based Steganographic Model with Dynamic Block Estimation with Fuzzy Rules , 2017 .
[59] Manivannan Doraipandian,et al. Chaotic Map Based Random Image Steganography Using LSB Technique , 2017, Int. J. Netw. Secur..
[60] Safya Belghith,et al. A new adaptive image steganography scheme based on DCT and chaotic map , 2017, Multimedia Tools and Applications.
[61] Khan Muhammad,et al. CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method , 2017, Multimedia Tools and Applications.
[62] Ibrahim Kamel,et al. High-capacity steganography: a global-adaptive-region discrete cosine transform approach , 2017, Multimedia Tools and Applications.
[63] N. Sasirekha,et al. High capacity steganography technique based on wavelet transform , 2016, 2016 Online International Conference on Green Engineering and Technologies (IC-GET).
[64] H. Dadgostar,et al. Image steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSB , 2016, J. Inf. Secur. Appl..
[65] A. Annis Fathima,et al. A cost effective approach for securing medical X-ray images using Chebyshev map , 2016, 2016 International Conference on Recent Trends in Information Technology (ICRTIT).
[66] Leonardo Palacios-Luengas,et al. A steganographic method using Bernoulli's chaotic maps , 2016, Comput. Electr. Eng..
[67] Sengül Dogan,et al. A new data hiding method based on chaos embedded genetic algorithm for color image , 2016, Artificial Intelligence Review.
[68] Manashee Kalita,et al. A novel steganographic method using 8-neighboring PVD (8nPVD) and LSB substitution , 2016, 2016 International Conference on Systems, Signals and Image Processing (IWSSIP).
[69] Shalini Stalin,et al. An Intelligent and Fast Chaotic Encryption Using Digital Logic Circuits for Ad-Hoc and Ubiquitous Computing , 2016, Entropy.
[70] Ahmed Al-Ani,et al. A steganography embedding method based on edge identification and XOR coding , 2016, Expert Syst. Appl..
[71] Chung-Yen Su,et al. Reversible watermarking for medical images using histogram shifting with location map reduction , 2016, 2016 IEEE International Conference on Industrial Technology (ICIT).
[72] Khalid A. Darabkh,et al. Efficient Reversible Data Hiding Using Multiple Predictors , 2016, Comput. J..
[73] S. Lenka,et al. Diagonal queue medical image steganography with Rabin cryptosystem , 2016, Brain Informatics.
[74] Lih-Chyau Wuu,et al. High capacity data hiding scheme based on multi-bit encoding function , 2016 .
[75] Shuliang Sun,et al. A novel edge based image steganography with 2k correction and Huffman encoding , 2016, Inf. Process. Lett..
[76] Gandharba Swain,et al. A Steganographic Method Combining LSB Substitution and PVD in a Block , 2016 .
[77] Mohammad Najmud Doja,et al. A Novel Edge Based Chaotic Steganography Method Using Neural Network , 2016, FICTA.
[78] J. Saira Banu,et al. Parallel Implementation of RSA 2D-DCT Steganography and Chaotic 2D-DCT Steganography , 2016, CVIP.
[79] Somjit Arch-int,et al. An adaptive multi bit-plane image steganography using block data-hiding , 2016, Multimedia Tools and Applications.
[80] Nameer N. El-Emam,et al. A novel algorithm for colour image steganography using a new intelligent technique based on three phases , 2015, Appl. Soft Comput..
[81] Tao Xiang,et al. Outsourcing chaotic selective image encryption to the cloud with steganography , 2015, Digit. Signal Process..
[82] Xiaoxiao Ma,et al. Reversible data hiding based on local histogram shifting with multilayer embedding , 2015, J. Vis. Commun. Image Represent..
[83] R. Venkatesan,et al. A Novel Image Encryption Using Calligraphy Based Scan Method and Random Number , 2015, KSII Trans. Internet Inf. Syst..
[84] José Raymundo Marcial-Romero,et al. A Modification of the TPVD Algorithm for Data Embedding , 2015, MCPR.
[85] Peyman Ayubi,et al. High secure digital image steganography based on 3D chaotic map , 2015, 2015 7th Conference on Information and Knowledge Technology (IKT).
[86] Mahdi Aziz,et al. A cycling chaos-based cryptic-free algorithm for image steganography , 2015, Nonlinear Dynamics.
[87] Li-Hong Huang,et al. A data hiding scheme using pixel value differencing and improving exploiting modification directions , 2015, Comput. Secur..
[88] S. Uma Maheswari,et al. Performance enhanced image steganography systems using transforms and optimization techniques , 2015, Multimedia Tools and Applications.
[89] Sabah Jassim,et al. Stego Quality Enhancement by Message Size Reduction and Fibonacci Bit-Plane Mapping , 2014, SSR.
[90] Hsien-Wen Tseng,et al. High-payload block-based data hiding scheme using hybrid edge detector with minimal distortion , 2014, IET Image Process..
[91] Hamidreza Rashidy Kanan,et al. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm , 2014, Expert Syst. Appl..
[92] Suvamoy Changder,et al. Image realization steganography with LCS based mapping , 2014, 2014 Seventh International Conference on Contemporary Computing (IC3).
[93] Reza Safabakhsh,et al. A new steganography method which preserves histogram: Generalization of LSB++ , 2014, Inf. Sci..
[94] M. C. Adhikary,et al. Digital Image Data Hiding Techniques: A Comparative Study , 2014, ArXiv.
[95] Ali Kanso,et al. A robust chaotic algorithm for digital image steganography , 2014, Commun. Nonlinear Sci. Numer. Simul..
[96] Iqtadar Hussain,et al. A technique for digital steganography using chaotic maps , 2014 .
[97] Jeanne Chen,et al. A PVD-based data hiding method with histogram preserving using pixel pair matching , 2014, Signal Process. Image Commun..
[98] Pye Pye Aung,et al. A Novel Secure Combination Technique of Steganography and Cryptography , 2014 .
[99] Mohammad Ali Akhaee,et al. One-third probability embedding: a new ±1 histogram compensating image least significant bit steganography scheme , 2014, IET Image Process..
[100] Kousik Dasgupta,et al. A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Encryption with Genetic Algorithm Optimization (CEGAO) , 2014, IBICA.
[101] Hai-Dong Yuan,et al. Secret sharing with multi-cover adaptive steganography , 2014, Inf. Sci..
[102] Xiao Wei Li,et al. Optical 3D watermark based digital image watermarking for telemedicine , 2013 .
[103] S. Selvakumar,et al. High payload image steganography with reduced distortion using octonary pixel pairing scheme , 2013, Multimedia Tools and Applications.
[104] B. M. Imran,et al. An efficient steganographic technique based on chaotic maps and adpative PPM embedding , 2013, 2013 International Conference on Signal Processing , Image Processing & Pattern Recognition.
[105] M. Chandrasekaran,et al. A novel technique for image steganography using nonlinear chaotic map , 2013, 2013 7th International Conference on Intelligent Systems and Control (ISCO).
[106] Suvamoy Changder,et al. Chaos based Edge Adaptive Image Steganography , 2013 .
[107] Ki-Hyun Jung,et al. Data hiding using edge detector for scalable images , 2012, Multimedia Tools and Applications.
[108] Anil K. Jain,et al. Biometric Authentication: System Security and User Privacy , 2012, Computer.
[109] Karim Faez,et al. New adaptive steganographic method using least significant- bit substitution and pixel-value differencing , 2012 .
[110] A. Kanso,et al. Steganographic algorithm based on a chaotic map , 2012 .
[111] J. Singh,et al. High Availability of Clouds: Failover Strategies for Cloud Computing Using Integrated Checkpointing Algorithms , 2012, 2012 International Conference on Communication Systems and Network Technologies.
[112] El-Sayed M. El-Alfy,et al. Improved pixel value differencing steganography using logistic chaotic maps , 2012, 2012 International Conference on Innovations in Information Technology (IIT).
[113] Julian Fiérrez,et al. Evaluation of direct attacks to fingerprint verification systems , 2011, Telecommun. Syst..
[114] Ahmad Habibizad Navin,et al. An Optimized Color Image Steganography Using LFSR and DFT Techniques , 2011 .
[115] G. R. Kanagachidambaresan,et al. Medical image security using LSB and chaotic logistic map , 2011, ARTCom 2011.
[116] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[117] Chin-Chen Chang,et al. Reversible Data Hiding Based on Histogram Modification of Pixel Differences , 2009, IEEE Transactions on Circuits and Systems for Video Technology.
[118] Tieyong Zeng,et al. A Generalization of LSB Matching , 2009, IEEE Signal Processing Letters.
[119] Cheng-Hsing Yang,et al. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.
[120] M. S. Sutaone,et al. Image based steganography using LSB insertion , 2008 .
[121] Wm. Arthur Conklin,et al. Principles of Computer Security , 2007 .
[122] Jiwu Huang,et al. Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition , 2007, IEEE Transactions on Image Processing.
[123] De-shuang Huang,et al. Computer-Aided Plant Species Identification (CAPSI) Based on Leaf Shape Matching Technique , 2006 .
[124] Michael R. Lyu,et al. Nonnegative independent component analysis based on minimizing mutual information technique , 2006, Neurocomputing.
[125] Anil K. Jain,et al. Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[126] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[127] J C Judge,et al. Steganography: Past, Present, Future , 2001 .
[128] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[129] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[130] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[131] Leon O. Chua,et al. Cryptography based on chaotic systems , 1997 .