A novel joint secret image sharing and robust steganography method using wavelet
暂无分享,去创建一个
[1] R. Fisher. THE USE OF MULTIPLE MEASUREMENTS IN TAXONOMIC PROBLEMS , 1936 .
[2] Adi Shamir,et al. How to share a secret , 1979, CACM.
[3] Samaneh Ghandali,et al. A secure joint wavelet based steganography and secret sharing method , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).
[4] Mauro Barni,et al. Improved wavelet-based watermarking through pixel-wise masking , 2001, IEEE Trans. Image Process..
[5] Jessica J. Fridrich,et al. Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..
[6] Ying Wang,et al. Optimized Feature Extraction for Learning-Based Image Steganalysis , 2007, IEEE Transactions on Information Forensics and Security.
[7] J. G. Fletcher,et al. An Arithmetic Checksum for Serial Transmissions , 1982, IEEE Trans. Commun..
[8] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[9] Ching-Nung Yang,et al. Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..
[10] Adrian S. Lewis,et al. Image compression using the 2-D wavelet transform , 1992, IEEE Trans. Image Process..
[11] Chin-Chen Chang,et al. Sharing secrets in stego images with authentication , 2008, Pattern Recognit..
[12] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[13] Pei-Yu Lin,et al. Invertible secret image sharing with steganography , 2010, Pattern Recognit. Lett..
[14] Hany Farid,et al. Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.
[15] Chang-Chou Lin,et al. Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..
[16] Chengyun Yang,et al. Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[17] Thierry Pun,et al. A Stochastic Approach to Content Adaptive Digital Image Watermarking , 1999, Information Hiding.
[18] J. Thomas Leontin Philjon,et al. Metamorphic cryptography — A paradox between cryptography and steganography using dynamic encryption , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).
[19] H. H. Zayed,et al. An adaptive steganographic technique based on integer wavelet transform , 2009, 2009 International Conference on Networking and Media Convergence.
[20] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..