Acceso abierto

Security Method For Combination Steganography Algorithms On Transform Domain For Jpeg Images


Cite

M. Ramkumar & A.N. Akansu. “Some Design Issues For Robust Data hiding Systems”, Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers, 1528 – 1532, 1999 Search in Google Scholar

N.F. Johnson, S. Jajodia, “Staganalysis: The Investigation of Hiding Information”, IEEE, pp. 113-116, 1998. Search in Google Scholar

R.Popa,”An Analysis of Steganographic System”, The Politehnica University of Timisoara, Faculty of Automatics and Computers, Department of Computer Science and Software Engineering, May 25, 1998. Search in Google Scholar

Kurak, C., and J. McHughes, “A Cautionary Note On Image Downgrading,” in IEEEComputer Security Applications Conference 1992, Proceedings, IEEE Press, 1992, pp.153-159. Search in Google Scholar

Johnson, N. F., and S. Jajodia, “Exploring Steganography Seeing the Unseen, IEEE Computer, vol. 31, no. 2, 1998, pp. 26-34.10.1109/MC.1998.4655281 Search in Google Scholar

F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, “Information Hiding—A Survey,” Proc. IEEE, vol. 87, no. 7, 1999, pp. 1062–1078.10.1109/5.771065 Search in Google Scholar

Thomas Mittelholzer, An information-theoretic approach to steganography and watermarking,Information Hiding, pp.1-16,2006.10.1007/10719724_1 Search in Google Scholar

C. Cachin, An Information-Theoretic Model for Steganography, Lecture Notes in Computer Science, vol.1525, pp.306-318, 199810.1007/3-540-49380-8_21 Search in Google Scholar

A.Westfeld and A. Pfitzmann, “Attacks on Steganographic Systems,” Proc. Information Hiding—3rd Int’l Workshop, Springer Verlag, 1999, pp. 61–76.10.1007/10719724_5 Search in Google Scholar

N. Provos, “Defending Against Statistical Steganalysis,” In Proceedings of USENIX Security Symposium, 2001, pp. 323–335. Search in Google Scholar

Bender, W., D. Gruhl, and N. Morimoto, “Techniques for data hiding”, IBM Systems Journal, vol. 35, no. 34, 1996, pp. 131-336.10.1147/sj.353.0313 Search in Google Scholar

Möller, S., A. Pitzmann, and I. Stirand, “Computer Based Steganography How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, At Best, in Information Hiding” First international Workshop, Proceedings, Springer, 1996, pp. 7-21.10.1007/3-540-61996-8_28 Search in Google Scholar

Cox, I., et al., “A Secure, Robust Watermark for Multimedia,” in Information Hiding: First International Workshop, Proceedings, vol. 1174 of Lecture Notes in Computer Science, Springer, 1996, pp. 185-206. Search in Google Scholar

O. Runaidh, J. J. K., F. M. Boland, and O. Sinnen, “Watermarking Digital Images for Copyright Protection,, Image and Signal Processing, Aug. 1996, vol. 143, pp. 250–256. Search in Google Scholar

J.R. Hernandez, M. Amado, & F. PerezGonzalez, “DCTDomain Watermarking Techniques for Still Images: Detector Performance Analysis and a New Structure”, IEEE Trans. Image Processing, 9, Jan. 2000, 55-68.10.1109/83.81759818255372 Search in Google Scholar

Wallace, G. K., The JPEG Still Picture Compression Standard, Communications of the ACM, vol. 34, no. 4, 1991, pp. 30-44.10.1145/103085.103089 Search in Google Scholar

J.J. Eggers, R. Bauml and B. Girod, “A communications approach to image steganography”, Proceedings of SPIE, vol.4675, pp.26-37, 2002. Search in Google Scholar

Philip Bateman and Dr. Hans “Image Steganography and Steganalysis”, M.S. thesis, Department of Computing Faculty of Engineering and Physical Sciences, University of Surrey Guildford Surrey, United Kingdom,2008. Search in Google Scholar

Fridrich J., Goljan M., and Hogea D., “Attacking the OutGuess”, Proc.ACM Workshop Multimedia and Security, 2002. Search in Google Scholar

A. Westfeld. “F5 - A Steganographic Algorithm: High Capacity Despite Better Steganalysis”, Lecture Notes in Computer Science, vol. 2137, pp. 289-302, 2001.10.1007/3-540-45496-9_21 Search in Google Scholar

H. G. Schaathun. “CSM25: Secure Information Hiding”, Lecture Notes, University of Surrey, UK, 2008. Search in Google Scholar

http;//www.cs.washington.eduresearchimagedatabasegroundtruth_tars.for.download Search in Google Scholar

Hossein Sheisi, Jafar Mesgarian, and Mostafa Rahmani, “Steganography: Dct Coefficient Replacement Method andCompare With Jsteg Algorithm” International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, August 2012.10.7763/IJCEE.2012.V4.533 Search in Google Scholar

Hideki Noda, Michiharu Niimi, and Eiji Kawaguchi, “High performance JPEG steganographyusing quantization index modulation in DCT domain” Pattern Recognition Letters 27, (2006). Issue 5, 455 – 46110.1016/j.patrec.2005.09.008 Search in Google Scholar

Yanmin LUO, Peizhong LIU and Minghong LIAO, An artificial immune network clustering algorithm for mangroves remote sensing, International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO. 1, pp. 116 – 134, 2014.10.21307/ijssis-2017-648 Search in Google Scholar

Daode Zhang et al., Research on chips’ defect extraction based on image-matching, International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO. 1, pp.321 – 336, 2014.10.21307/ijssis-2017-658 Search in Google Scholar

eISSN:
1178-5608
Idioma:
Inglés
Calendario de la edición:
Volume Open
Temas de la revista:
Engineering, Introductions and Overviews, other