À propos de cet article

Citez

Niels Provos and Peter Honeyman “Hide and Seek: An Introduction to Steganography” , IEEE Computer Society ,Vol.1,No.3, 2003,pp.32-44.10.1109/MSECP.2003.1203220 Search in Google Scholar

Philip Bateman and Dr. Hans “Image Steganography and Steganalysis”, M.S., Department of Computing Faculty of Engineering and Physical Sciences, University of Surrey Guildford Surrey, United Kingdom, 2008. Search in Google Scholar

Hossein Sheisi, Jafar Mesgarian, and Mostafa Rahmani “Steganography: Dct Coefficient Replacement Method and Compare With JSteg Algorithm “,International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, August 201210.7763/IJCEE.2012.V4.533 Search in Google Scholar

Vijay and Vishal” A Steganography Algorithm for Hiding Image in Image by Improved LSB Substitution by Minimize Detection”, Theoretical and Applied Information Technology, Vol. 36, No.1,2012 Search in Google Scholar

Mohamed Amin, Hatem M. Abdullkader, Hani M. Ibrahem, and Ahmed S. Sakr1”A Steganographic Method Based on DCT and New Quantization Technique”, International Journal of Network Security, Vol.16, No.3, PP.214-219, May 2014 Search in Google Scholar

Ramandeep Kaur Toor and Ramanjot Kaur”A Steganographic Method Based Upon JPEG and Quantization Table Modification”, International Journal of Information Technology and Knowledge Management ,NO.1,Vol.6, pp. 19-21, 2012 Search in Google Scholar

Mohit Kumar Goel & Neelu Jain “A Novel Steganographic Technique Based on LSB-DCT Approach” , in National Conference on Emerging Trends in Information and Computing Technologies NCETICT, 2012. Search in Google Scholar

Chan, C.K. and Cheng. L.M. “Hiding Data in Image by Simple LSB Substitution”, Pattern Recognition, No.3, Vol.37, pp. 469 – 474, 2004.10.1016/j.patcog.2003.08.007 Search in Google Scholar

Chang,C.C and Tseng, H.W. “A Steganographic Method for Digital Images Using Side Match”, Pattern Recognition Letters,No.12, Vol.25, pp. 1431 – 1437, 2004. Search in Google Scholar

Sayuthi Jaafar, Azizah A Manaf, Akram M Zeki, “Steganography Technique Using Modulus Arithmetic”, in 9th International Symposium on Signal Processing and Its Applications, pp. 1 – 4, 2007.10.1109/ISSPA.2007.4555443 Search in Google Scholar

W. Bender, D. Gruhl, N. Morimoto, and A. Lu,” Techniques for Data Hiding”, I.B.M. Systems Journal, No.3.4,Vol.35, pp. 313-336, 1996.10.1147/sj.353.0313 Search in Google Scholar

N. Nikolaidis, and I. Pitas, “Robust Image Watermarking in the Spatial Domain”, Signal Processing, No.3,Vol.66, pp. 385-403, 199810.1016/S0165-1684(98)00017-6 Search in Google Scholar

T. Morkel, J. Eloff, and M. Olivier,”An Overview of Image Steganography”, In Proceedings of the Fifth Annual Information Security South Africa Conference ISSA, 2005. Search in Google Scholar

Currie, D.L. & Irvine, C.E., “Surmounting the Effects of Lossy Compression on Steganography”, in19th National Information Systems Security Conference, 1996 Search in Google Scholar

D. Fu, Y. Shi, D. Zou, and G. Xuan. “JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain”, IEEE: 8th Workshop on Multimedia Signal Processing 2006, pp. 310313, 2006. Search in Google Scholar

Tao Zhang & Xijian Ping “A Fast and Effective Steganalytic Technique against JSteg-like Algorithms” SAC 2003.10.1145/952532.952595 Search in Google Scholar

N. Provos. “Defending Against Statistical Steganalysis”, 10th USENIX Security Symposium, vol. 10, pp. 323-335, 2001 Search in Google Scholar

Fridrich J., Goljan M., and Hogea D., “Attacking the OutGuess,” ,Proc.ACM Workshop Multimedia and Security, 2002. Search in Google Scholar

Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt “Digital image steganography: Survey and analysis of current methods” , Signal Processing, No.3,Vol.90, pp 727–752,2010.10.1016/j.sigpro.2009.08.010 Search in Google Scholar

X. Li, J. Wang, “A Steganographic Method Based Upon JPEG and Particle Swarm Optimization Algorithm”, Information Sciences, No.15,Vol.177, pp. 3099–31091, 2007. Search in Google Scholar

S.C.Mukhopadhyay, F.P.Dawson, M.Iwahara and S.Yamada, “A Novel Compact Magnetic Current Limiter for Three Phase Applications”, IEEE Transactions on Magnetics, Vol. 36, No. 5, pp. 3568-3570, September 2000. Search in Google Scholar

Y.H. Yu, C.C. Chang, I.C. Lin,” A New Steganographic Method for Color and Grayscale Image Hiding”, Computer Vision and Image Under- standing, No.3,Vol.107, pp.183–194,2007.10.1016/j.cviu.2006.11.002 Search in Google Scholar

S.C.Mukhopadhyay, S. Deb Choudhury, T. Allsop, V. Kasturi and G. E. Norris, “Assessment of pelt quality in leather making using a novel non-invasive sensing approach”, Journal of Biochemical and Biophysical methods, Elsevier, JBBM Vol. 70, pp. 809-815, 2008.10.1016/j.jbbm.2007.07.00317707083 Search in Google Scholar

A.I. Hashad, A.S. Madani, A.E.M.A.” Wahdan, A Robust Steganography Technique Using Discrete Cosine Transform Insertion”, in IEEE/ITI Third International Conference on Information and Communications Technology, 2005, pp. 255–264. Search in Google Scholar

http;//www.cs.washington.eduresearchimagedatabasegroundtruth_tars.for.download Search in Google Scholar

http://vision.okstate.eduloc=csiq Search in Google Scholar

N.K. Suryadevara, S.C. Mukhopadhyay, R. Wang, R.K. Rayudu, Forecasting the behavior of an elderly using wireless sensors data in a smart home, Engineering Applications of Artificial Intelligence, Volume 26, Issue 10, November 2013, Pages 2641-2652, ISSN 0952-1976, http://dx.doi.org/10.1016/j.engappai.2013.08.004.10.1016/j.engappai.2013.08.004 Search in Google Scholar

V.Nagaraj, Dr. V. Vijayalakshmi and Dr. G. Zayaraz” Color Image Steganography based on Pixel Value Modification Method Using Modulus Function” International Conference on Electronic Engineering and Computer Science, IERI Procedia 4, 2013, pp. 17 – 24.10.1016/j.ieri.2013.11.004 Search in Google Scholar

Yanmin LUO, Peizhong LIU and Minghong LIAO, An artificial immune network clustering algorithm for mangroves remote sensing, International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO. 1, pp. 116 – 134, 2014.10.21307/ijssis-2017-648 Search in Google Scholar

Daode Zhang et al., Research on chips’ defect extraction based on image-matching, International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO. 1, pp. 321 – 336, 2014.10.21307/ijssis-2017-658Search in Google Scholar

eISSN:
1178-5608
Langue:
Anglais
Périodicité:
Volume Open
Sujets de la revue:
Engineering, Introductions and Overviews, other