Adaptive image steganography based on transform domain via genetic algorithm
暂无分享,去创建一个
Karim Faez | Aref Miri | K. Faez | Aref Miri
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] B Javidi,et al. Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.
[3] Malay Kumar Kundu,et al. Genetic algorithms for optimality of data hiding in digital images , 2008, Soft Comput..
[4] Arsham Abedini,et al. Parallel Improved Pulse Coupled Neural Network Application for Edge Detection in Image Processing , 2017 .
[5] Ahmed Al-Ani,et al. A steganography embedding method based on edge identification and XOR coding , 2016, Expert Syst. Appl..
[6] Karim Faez,et al. An image steganography method based on integer wavelet transform , 2017, Multimedia Tools and Applications.
[7] S. K. Sudheer,et al. Performance and analysis of high capacity Steganography of color images involving Wavelet Transform , 2015 .
[8] Hamidreza Rashidy Kanan,et al. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm , 2014, Expert Syst. Appl..
[9] Shahrokh Ghaemmaghami,et al. One-third probability embedding: Less detectable LSB steganography , 2009, 2009 IEEE International Conference on Multimedia and Expo.
[10] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[11] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[12] Xinpeng Zhang,et al. Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.
[13] Chin-Chen Chang,et al. A steganographic scheme by fully exploiting modification directions , 2011, Expert Syst. Appl..
[14] Chun-Hsien Chou,et al. A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile , 1995, IEEE Trans. Circuits Syst. Video Technol..
[15] Punam Bedi,et al. Using PSO in a spatial domain based image hiding scheme with distortion tolerance , 2013, Comput. Electr. Eng..
[16] Al-Sakib Khan Pathan,et al. Mix column transform based on irreducible polynomial mathematics for color image steganography: A novel approach , 2014, Comput. Electr. Eng..
[17] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .
[18] C. Reeves. Modern heuristic techniques for combinatorial problems , 1993 .
[19] Yongjian Hu,et al. A high capacity lossless data hiding scheme for JPEG images , 2013, J. Syst. Softw..
[20] AbduallahWafaa Mustafa,et al. Mix column transform based on irreducible polynomial mathematics for color image steganography , 2014 .
[21] Peng Ying-Ning,et al. The design of a kind of chirp-like mother wavelet by neural network , 1996, Proceedings of Third International Conference on Signal Processing (ICSP'96).
[22] John T. Sheridan,et al. Optical encryption by combining image scrambling techniques in fractional Fourier domains , 2013 .
[23] John T. Sheridan,et al. A review of optical image encryption techniques , 2014 .
[24] R. Davis,et al. The data encryption standard in perspective , 1978, IEEE Communications Society Magazine.