An Optimized Steganography Hiding Capacity and Imperceptibly Using Genetic Algorithms
暂无分享,去创建一个
Ahmad Alhindi | Waleed Alasmary | Mohamed Mahmoud | Ranyiah Wazirali | Waleed S. Alasmary | Ahmad Alhindi | W. Alasmary | Mohamed Mahmoud | Ranyiah Wazirali
[1] Ajith Abraham,et al. Significance of steganography on data security , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[2] Cheng-Hsing Yang,et al. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.
[3] Cheng-Hsiung Hsieh,et al. Generating facial images for steganography based on IGA and image morphing , 2012, 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[4] J. K. Mandal,et al. A Genetic Algorithm based Steganography Using Discrete Cosine Transformation (GASDCT) , 2013 .
[5] Amandeep Kaur,et al. STEGANOGRAPHIC APPROACH FOR HIDING IMAGE IN DCT DOMAIN , 2011 .
[6] Francisco J. Gallegos-Funes,et al. Adjust of energy with compactly supported orthogonal wavelet for steganographic algorithms using the scaling function , 2013 .
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[9] Zenon Chaczko,et al. Hyper Edge Detection with Clustering for Data Hiding , 2016, J. Inf. Hiding Multim. Signal Process..
[10] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[11] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[12] Zenon Chaczko,et al. Data Hiding Based on Intelligent Optimized Edges for Secure Multimedia Communication , 2015, J. Networks.
[13] Chin-Chen Chang,et al. High payload steganography mechanism using hybrid edge detector , 2010, Expert Syst. Appl..
[14] George Stephanides,et al. A novel technique for image steganography based on a high payload method and edge detection , 2012, Expert Syst. Appl..
[15] Zenon Chaczko,et al. EA based Heuristic Segmentation for Efficient Data Hiding , 2015 .
[16] Moni Naor,et al. Visual Cryptography II: Improving the Contrast Via the Cover Base , 1996, Security Protocols Workshop.
[17] Soleimanpour Mohadeseh,et al. A NOVEL TECHNIQUE FOR STEGANOGRAPHY METHOD BASED ON IMPROVED GENETIC ALGORITHM OPTIMIZATION IN SPATIAL DOMAIN , 2013 .
[18] Karim Faez,et al. Adaptive image steganography based on transform domain via genetic algorithm , 2017 .
[19] Shweta Joshi,et al. Selection of Image Blocks using Genetic Algorithm and Effective Embedding with DCT for Steganography , 2016, COMPUTE.
[20] Ainuddin Wahid Abdul Wahab,et al. Image steganography in spatial domain: A survey , 2018, Signal Process. Image Commun..
[21] David B. Fogel,et al. Evolution-ary Computation 1: Basic Algorithms and Operators , 2000 .
[22] N. Pierce. Origin of Species , 1914, Nature.
[23] Po-Yueh Chen,et al. A DWT Based Approach for Image Steganography , 2006 .
[24] Wen-Yuan Chen,et al. Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques , 2008, Appl. Math. Comput..
[25] Hedieh Sajedi,et al. BSS: Boosted steganography scheme with cover image preprocessing , 2010, Expert Syst. Appl..
[26] Samir Kumar Bandyopadhyay,et al. A Novel Steganographic Technique Based on 3D-DCT Approach , 2010, Comput. Inf. Sci..
[27] Z. Azimifar,et al. Image steganography based on pixel ranking and Particle Swarm Optimization , 2012, The 16th CSI International Symposium on Artificial Intelligence and Signal Processing (AISP 2012).
[28] Ronak Karimi,et al. Steganography in Image Segments Using Genetic Algorithm , 2015, 2015 Fifth International Conference on Advanced Computing & Communication Technologies.
[29] Hideki Noda,et al. High-performance JPEG steganography using quantization index modulation in DCT domain , 2006, Pattern Recognit. Lett..
[30] J. Shanbehzadeh,et al. High Capacity Image Steganography usingWavelet Transform and Genetic Algorithm , 2011 .
[31] Zenon Chaczko,et al. Perceptual threshold in DWT for optimum embedding rate in data hiding using HVS and GA , 2015, 2015 International Conference on Image and Vision Computing New Zealand (IVCNZ).
[32] Romany F. Mansour,et al. An evolutionary computing enriched RS attack resilient medical image steganography model for telemedicine applications , 2017, Multidimens. Syst. Signal Process..
[33] R. S. Bichkar,et al. A Secure Spatial Domain Image Steganography Using Genetic Algorithm and Linear Congruential Generator , 2018 .
[34] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[35] Yu-An Ho,et al. Image Hiding with an Improved Genetic Algorithm and an Optimal Pixel Adjustment Process , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.
[36] S. Katzenbeisser,et al. A survey of steganographic techniques , .
[37] Daoben Zhu,et al. Immobilization of tetra-tert-butylphthalocyanines on carbon nanotubes: a first step towards the development of new nanomaterials , 2002 .
[38] Mohammad Mehdi Rashidi,et al. Increasing image compression rate using steganography , 2013, Expert Syst. Appl..
[39] Hamidreza Rashidy Kanan,et al. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm , 2014, Expert Syst. Appl..
[40] Darrell Whitley,et al. A genetic algorithm tutorial , 1994, Statistics and Computing.
[41] Ahmed H. Tewfik,et al. A novel high-capacity data-embedding system , 2006, IEEE Transactions on Image Processing.
[42] Yao Zhao,et al. Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm , 2010, EURASIP J. Adv. Signal Process..
[43] J. Anitha,et al. A modified genetic algorithm for performance improvement of transform based image steganography systems , 2018, J. Intell. Fuzzy Syst..
[44] Kathleen Ahrens,et al. From Lexical Semantics to Conceptual Metaphors : Mapping Principle Verification with WordNet and SUMO , 2004 .