An adaptive color image steganography method using adjacent pixel value differencing and LSB substitution technique
暂无分享,去创建一个
Swanirbhar Majumder | Manashee Kalita | Themrichon Tuithung | Swanirbhar Majumder | T. Tuithung | Manashee Kalita
[1] Karim Faez,et al. New adaptive steganographic method using least significant- bit substitution and pixel-value differencing , 2012 .
[2] Manashee Kalita,et al. A novel steganographic method using 8-neighboring PVD (8nPVD) and LSB substitution , 2016, 2016 International Conference on Systems, Signals and Image Processing (IWSSIP).
[3] Gandharba Swain,et al. Performance evaluation parameters of image steganography techniques , 2016, 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS).
[4] M. Hwang,et al. Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .
[5] Cheng-Hsing Yang,et al. Inverted pattern approach to improve image quality of information hiding by LSB substitution , 2008, Pattern Recognit..
[6] Ming Yang,et al. Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy , 2009, Int. J. Inf. Secur. Priv..
[7] Shahrokh Ghaemmaghami,et al. Colour image steganography method based on sparse representation , 2015, IET Image Process..
[8] Cheng-Hsing Yang,et al. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.
[9] D. M. Hutton,et al. Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia , 2005 .
[10] Gandharba Swain,et al. Digital Image Steganography Using Variable Length Group Of Bits Substitution , 2016 .
[11] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[12] Gandharba Swain,et al. A Steganographic Method Combining LSB Substitution and PVD in a Block , 2016 .
[13] Gerhard F. Strasser. Review of Versteckte Botschaften. Die faszinierende Geschichte der Steganografie (Hidden Messages. The Fascinating Story of Steganography) , 2010, Cryptologia.
[14] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[15] Xinpeng Zhang,et al. Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security , 2004, Pattern Recognit. Lett..
[16] Gandharba Swain,et al. Digital Image Steganography Using Bit Flipping , 2018 .
[17] Chin-Feng Lee,et al. A novel data hiding scheme based on modulus function , 2010, J. Syst. Softw..
[18] Gandharba Swain,et al. Adaptive pixel value differencing steganography using both vertical and horizontal edges , 2016, Multimedia Tools and Applications.
[19] Vinay Kumar,et al. Data Hiding Method Based on Inter-Block Difference in Eight Queens Solutions and LSB Substitution , 2014, Int. J. Inf. Secur. Priv..
[20] Wei Gong,et al. An improved method for LSB based color image steganography combined with cryptography , 2016, 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS).
[21] Fabien A. P. Petitcolas,et al. Fair benchmark for image watermarking systems , 1999, Electronic Imaging.
[22] Gandharba Swain,et al. Adaptive and Non-adaptive PVD Steganography Using Overlapped Pixel Blocks , 2018 .
[23] J. K. Mandal,et al. Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain , 2012 .
[24] Ki-Hyun Jung,et al. Three-Directional Data Hiding Method for Digital Images , 2014, Cryptologia.
[25] Claudia Feregrino Uribe,et al. On the Implementation of a Hardware Architecture for an Audio Data Hiding System , 2011, J. Signal Process. Syst..
[26] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[27] Jessica J. Fridrich,et al. Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.
[28] Mehdi Hussain,et al. Recursive Information Hiding Scheme Through LSB, PVD Shift, and MPE , 2018 .
[29] Mauro Barni,et al. MPSteg-Color: Data Hiding Through Redundant Basis Decomposition , 2009, IEEE Transactions on Information Forensics and Security.
[30] Gandharba Swain,et al. Information Hiding Using Group of Bits Substitution , 2017 .
[31] Gandharba Swain,et al. Very High Capacity Image Steganography Technique Using Quotient Value Differencing and LSB Substitution , 2018, Arabian Journal for Science and Engineering.
[32] Sunil R. Hirekhan,et al. Implementation of colour image steganography using LSB and edge detection technique: A LabVIEW approach , 2016, 2016 International Conference on Communication and Signal Processing (ICCSP).
[33] M. C. Hanumantharaju,et al. Design and development of new reconfigurable architectures for LSB/multi-bit image steganography system , 2016, Multimedia Tools and Applications.
[34] Gandharba Swain,et al. Digital Image Steganography based on Seven Way Pixel Value Differencing , 2016 .
[35] R. F. Brown,et al. PERFORMANCE EVALUATION , 2019, ISO 22301:2019 and business continuity management – Understand how to plan, implement and enhance a business continuity management system (BCMS).
[36] Gandharba Swain,et al. An Improved Data Hiding Technique Using Bit Differencing and LSB Matching , 2022 .