Evaluating image steganography techniques: Future research challenges
暂无分享,去创建一个
[1] Adnan Abdul-Aziz Gutub,et al. Pixel Indicator Technique for RGB Image Steganography , 2010 .
[2] J. Fridrich,et al. Attacking the OutGuess , 2002 .
[3] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[4] Jan H. P. Eloff,et al. An overview of image steganography , 2005, ISSA.
[5] Nasir D. Memon,et al. Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[6] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[7] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[8] Hannes Federrath,et al. Modeling the Security of Steganographic Systems , 1998, Information Hiding.
[9] Birgit Pfitzmann,et al. Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals , 1996, Information Hiding.
[10] Min-Shiang Hwang,et al. A high quality steganographic method with pixel-value differencing and modulus function , 2008, J. Syst. Softw..
[11] Ja-Chen Lin,et al. Hiding data in images by optimal moderately-significant-bit replacement , 2000 .
[12] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[13] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[14] K. R. Venugopal,et al. Robust and high capacity image steganography using SVD , 2007 .
[15] S. Samavi,et al. Steganalysis of Pixel-Value Differencing Steganographic Method , 2007, 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.
[16] Ioannis Pitas,et al. Extraction of facial regions and features using color and shape information , 1996, Proceedings of 13th International Conference on Pattern Recognition.
[17] Bin Li,et al. A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..
[18] Husrev T. Sencar,et al. Image Steganography: Concepts and Practice , 2004 .
[19] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.
[20] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[21] Ioannis Pitas,et al. Face localization and facial feature extraction based on shape and color information , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[22] Michael Backes,et al. Reliable broadcast in a computational hybrid model with Byzantine faults, crashes, and recoveries , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[23] S. Katzenbeisser,et al. A survey of steganographic techniques , .
[24] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[25] Lee-Ming Cheng,et al. Improved hiding data in images by optimal moderately-significant-bit replacement , 2001 .
[26] Ki-Ryong Kwon,et al. An Image Steganography Using Pixel Characteristics , 2005, CIS.
[27] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[28] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[29] R. Akila,et al. A Comparative Analysis of Image Steganography , 2010 .
[30] Tomás Pevný,et al. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.
[31] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[32] R. Crandall,et al. Some Notes on Steganography , 1999 .
[33] Kevin Curran,et al. Biometric Inspired Digital Image Steganography , 2008, 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ecbs 2008).
[34] Anjali A. Shejul,et al. A Secure Skin Tone based Steganography Using Wavelet Transform , 2011 .
[35] Juan Jose Roque. SLSB: Improving the Steganographic Algorithm LSB , 2009, WOSIS.