Chaos based Edge Adaptive Image Steganography
暂无分享,去创建一个
[1] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[2] Liehuang Zhu,et al. A Novel Algorithm for Scrambling Digital Image Based on Cat Chaotic Mapping , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.
[3] Yeung Sam Hung,et al. A Hierarchical Approach for Fast and Robust Ellipse Extraction , 2007, 2007 IEEE International Conference on Image Processing.
[4] Cheng-Hsing Yang,et al. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.
[5] K. L. Shunmuganathan,et al. Steganography using edge adaptive image , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).
[6] Qing-Xin Zhu,et al. A Spatial Domain Color Watermarking Scheme based on Chaos , 2008, 2008 International Conference on Apperceiving Computing and Intelligence Analysis.
[7] Sergei Azernikov. Sweeping solids on manifolds , 2008, SPM '08.
[8] Amir-Masoud Eftekhari-Moghadam,et al. Color image cryptosystem using chaotic maps , 2011, 2011 IEEE Symposium On Computational Intelligence For Multimedia, Signal And Vision Processing.
[9] John F. Canny,et al. A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[10] Olivier Déforges,et al. Enhanced Adaptive Data Hiding in Spatial LSB Domain by using Chaotic Sequences , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[11] N. C. Debnath,et al. Evaluating image steganography techniques: Future research challenges , 2013, 2013 International Conference on Computing, Management and Telecommunications (ComManTel).
[12] Bin Li,et al. A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..
[13] Tieyong Zeng,et al. A Generalization of LSB Matching , 2009, IEEE Signal Processing Letters.
[14] Li Bin. Comparison for Image Edge Detection Algorithms , 2012 .
[15] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[16] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[17] Wang Qian,et al. Encryption Algorithm Based on RSA , 2005 .
[18] Zhang Xin,et al. Image encryption algorithm based on Henon chaotic system , 2009, 2009 International Conference on Image Analysis and Signal Processing.
[19] G. Kelly,et al. Security, privacy, and confidentiality issues on the Internet , 2002, Journal of medical Internet research.