A Novel Image Steganographic Method based on Integer Wavelet Transformation and Particle Swarm Optimization
暂无分享,去创建一个
[1] Chin-Chen Chang,et al. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..
[2] Yudong Zhang,et al. Detection of Alzheimer's disease and mild cognitive impairment based on structural volumetric MR images using 3D-DWT and WTA-KSVM trained by PSOTVAC , 2015, Biomed. Signal Process. Control..
[3] Reza Safabakhsh,et al. A novel stability-based adaptive inertia weight for particle swarm optimization , 2016, Appl. Soft Comput..
[4] Russell C. Eberhart,et al. Parameter Selection in Particle Swarm Optimization , 1998, Evolutionary Programming.
[5] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[6] Riccardo Poli,et al. Particle swarm optimization , 1995, Swarm Intelligence.
[7] Ton Kalker,et al. Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform , 2007, IEEE Transactions on Information Forensics and Security.
[8] Xiaoxiao Ma,et al. High-fidelity reversible data hiding scheme based on multi-predictor sorting and selecting mechanism , 2015, J. Vis. Commun. Image Represent..
[9] Andrea Serani,et al. Parameter selection in synchronous and asynchronous deterministic particle swarm optimization for ship hydrodynamics problems , 2016, Appl. Soft Comput..
[10] Wim Sweldens,et al. The lifting scheme: a construction of second generation wavelets , 1998 .
[11] Frank Y. Shih,et al. Digital Watermarking and Steganography: Fundamentals and Techniques , 2007 .
[12] Chin-Chen Chang,et al. A high payload frequency-based reversible image hiding method , 2010, Inf. Sci..
[13] Chengyun Yang,et al. Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[14] R. Eberhart,et al. Empirical study of particle swarm optimization , 1999, Proceedings of the 1999 Congress on Evolutionary Computation-CEC99 (Cat. No. 99TH8406).
[15] Min Wu,et al. Data hiding in image and video .I. Fundamental issues and solutions , 2003, IEEE Trans. Image Process..
[16] Daniele Peri,et al. A multistart gradient-based algorithm with surrogate model for global optimization , 2012 .
[17] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[18] Andrew D. Ker. Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.
[19] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[20] Shu-Fen Tu,et al. Finding Optimal LSB Substitution Using Ant Colony Optimization Algorithm , 2010, 2010 Second International Conference on Communication Software and Networks.
[21] Jianjun Wang,et al. A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..
[22] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..
[23] Nor Ashidi Mat Isa,et al. Fast retrieval of hidden data using enhanced hidden Markov model in video steganography , 2015, Appl. Soft Comput..
[24] Ali Kanso,et al. A robust chaotic algorithm for digital image steganography , 2014, Commun. Nonlinear Sci. Numer. Simul..
[25] Maurice Clerc,et al. The particle swarm - explosion, stability, and convergence in a multidimensional complex space , 2002, IEEE Trans. Evol. Comput..
[26] H. H. Zayed,et al. An adaptive steganographic technique based on integer wavelet transform , 2009, 2009 International Conference on Networking and Media Convergence.
[27] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[28] D. Artz,et al. Digital steganography: hiding data within data , 2001 .
[29] The Duc Kieu,et al. A reversible steganographic scheme for VQ indices based on joint neighboring and predictive coding , 2016, Multimedia Tools and Applications.
[30] Nameer N. El-Emam. New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization , 2015, Comput. Secur..
[31] Chin-Chen Chang,et al. A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..
[32] Chin-Chen Chang,et al. A reversible compression code hiding using SOC and SMVQ indices , 2015, Inf. Sci..
[33] Xiaoxiao Ma,et al. Reversible data hiding scheme for VQ indices based on modified locally adaptive coding and double-layer embedding strategy , 2015, J. Vis. Commun. Image Represent..
[34] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[35] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998 .
[36] Pachiyappan Arulmozhivarman,et al. RAND - STEG: an integer wavelet transform domain digital image random steganography using knight's tour , 2015, Secur. Commun. Networks.
[37] Punam Bedi,et al. Using PSO in a spatial domain based image hiding scheme with distortion tolerance , 2013, Comput. Electr. Eng..
[38] Ahmed Al-Ani,et al. A steganography embedding method based on edge identification and XOR coding , 2016, Expert Syst. Appl..
[39] Amir-Masoud Eftekhari-Moghadam,et al. An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method , 2015, Appl. Soft Comput..
[40] Swaminathan Ramakrishnan,et al. Imperceptibility - Robustness tradeoff studies for ECG steganography using Continuous Ant Colony Optimization , 2016, Expert Syst. Appl..
[41] A. Bovik,et al. A universal image quality index , 2002, IEEE Signal Processing Letters.
[42] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[43] Shyr-Shen Yu,et al. A HDWT-based reversible data hiding method , 2009, J. Syst. Softw..
[44] Bo Zhang,et al. Packed integer wavelet transform constructed by lifting scheme , 2000, IEEE Trans. Circuits Syst. Video Technol..
[45] Vijay H. Mankar,et al. Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..
[46] Nameer N. El-Emam,et al. A novel algorithm for colour image steganography using a new intelligent technique based on three phases , 2015, Appl. Soft Comput..
[47] Xiaolong Li,et al. A further study of large payloads matrix embedding , 2015, Inf. Sci..
[48] Jessica J. Fridrich,et al. Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..
[49] Chin-Chen Chang,et al. Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels , 2006, Pattern Recognit..
[50] Mohammad Mehdi Ebadzadeh,et al. A novel particle swarm optimization algorithm with adaptive inertia weight , 2011, Appl. Soft Comput..
[51] Karim Faez,et al. An image steganography method based on integer wavelet transform , 2017, Multimedia Tools and Applications.
[52] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[53] Christian Cachin,et al. An information-theoretic model for steganography , 2004, Inf. Comput..
[54] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[55] Ioan Cristian Trelea,et al. The particle swarm optimization algorithm: convergence analysis and parameter selection , 2003, Inf. Process. Lett..
[56] Harold Joseph Highland,et al. Data encryption: A non-mathematical approach , 1997, Comput. Secur..
[57] Hamidreza Rashidy Kanan,et al. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm , 2014, Expert Syst. Appl..
[58] Genlin Ji,et al. Preliminary research on abnormal brain detection by wavelet-energy and quantum- behaved PSO. , 2016, Technology and health care : official journal of the European Society for Engineering and Medicine.
[59] Punam Bedi,et al. Using PSO in Image Hiding Scheme Based on LSB Substitution , 2011, ACC.
[60] Girolamo Fornarelli,et al. An unsupervised multi-swarm clustering technique for image segmentation , 2013, Swarm Evol. Comput..
[61] I. Daubechies,et al. Wavelet Transforms That Map Integers to Integers , 1998 .
[62] Rengarajan Amirtharajan,et al. An intelligent chaotic embedding approach to enhance stego-image quality , 2012, Inf. Sci..
[63] Pradeep M. Patil,et al. Robust and secured image-adaptive data hiding , 2012, Digit. Signal Process..
[64] Sushil Jajodia,et al. Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).