INFORMAZIONI SU QUESTO ARTICOLO

Cita

Rajarathnam Chandramouli, Mehdi Kharrazi, Nasir Memon” Image Steganography and Steganalysis: Concepts and Practice” Second International Workshop, Seoul, Korea, Revised Papers, Volume 2939, pp 35-49, 2004.10.1007/978-3-540-24624-4_3 Search in Google Scholar

Jitendra Jain, Punit Johari” Digital Image Watermarking Based on LSB for Gray Scale Image” IJCSNS International Journal of Computer Science and Network Security, VOL.14 No.6,pp. 108-112, June 2014. Search in Google Scholar

Firas A. Jassim” Novel Steganography Algorithm for Hiding Text in Image using Five Modulus Method” International Journal of Computer Applications (0975 – 8887) Volume 72– No.17, pp. 39-44, June 2013. Search in Google Scholar

Mehdi Hussain and Mureed Hussain” A Survey of Image Steganography Techniques” International Journal of Advanced Science and Technology Vol. 54, pp 113-124, May 2013. Search in Google Scholar

F. Alturki and R. Mersereau,”Secure blind image steganographic technique using discrete fourier transformation ,” IEEE International Conference on Image Processing, Thessaloniki, Greece., vol.2, 542 – 545, 2001. Search in Google Scholar

N. Provos, “Probabilistic Methods for Improving Information Hiding”, CITI Technical Report 01-1, pp. 1-8, January, 2001. Search in Google Scholar

R A Isbell, “Steganography: Hidden Menace or Hidden Saviour”, Steganography White Paper, 10 May 2002. Search in Google Scholar

Alisha Arora, Mrs. Nirvair Neeru, Mrs. Taqdir”IMAGE STEGANOGRAPHY TECHNIQUES: AN OVERVIEW” International Journal For Technological Research In Engineering Volume 1, Issue 9,pp.924-929, May-2014. Search in Google Scholar

Kuanchin Chen “Digital Watermarking and Steganography” Western Michigan University, USA 2009, IGI Global.Search in Google Scholar

Provos, N.& Honeyman, P. “Hide and Seek: An introduction to steganography”, IEEE Security and Privacy Journal, vol 1, Issue 3 , pp 32 – 44, 2003.10.1109/MSECP.2003.1203220Search in Google Scholar

Fridrich. J., Lukas J. and Goljan M., “Digital Camera Identification from Sensor Noise”,IEEE Transactions on Information Security and Forensics, vol 1(2), pp 205-214, 2006.10.1109/TIFS.2006.873602Search in Google Scholar

N. Provos, “Defending Against Statistical Steganalysis,” In Proceedings of USENIX Security Symposium, pp. 323–335, 2001.Search in Google Scholar

Ajinkya Kawale, Shubham Gaidhani”Digital Image Watermarking”International Journal of Scientific& Engineering Research, Volume 4, Issue 5, pp. 1899-1901, 2013.Search in Google Scholar

Yusuf Perwej, Firoj Parwej , Asif Perwej”An Adaptive Watermarking Technique for the copyright of digital images and Digital Image Protection”, The International Journal of Multimedia& Its Applications (IJMA) Vol.4, No.2, pp. 21-38, 2012.10.5121/ijma.2012.4202Search in Google Scholar

Wang R.Z. , Lin C.F. , Lin J.C. “Image hiding by optimal LSB substitution and genetic algorithm”, Pattern Recognition, vol 34 , no 3 , pp 671 – 683, 2001.10.1016/S0031-3203(00)00015-7Search in Google Scholar

Puneet Kr Sharma and Rajni” ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM” International Journal of Information Sciences and Techniques (IJIST) Vol. 2, No.4, pp. 95-101, July 2012.10.5121/ijist.2012.2409Search in Google Scholar

Philip Bateman and Dr. Hans “Image Steganography and Steganalysis”, M.S., Department of Computing Faculty of Engineering and Physical Sciences, University of Surrey Guildford Surrey, United Kingdom, Submitted for the Degree of Master of Science in Security Technologies& Applications 2008.Search in Google Scholar

R. Z. Wang, C. F. Lin, and J. C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, vol. 34, no. 3, pp.671-683, Mar. 2001.10.1016/S0031-3203(00)00015-7Search in Google Scholar

A. Westfeld. “F5 - A Steganographic Algorithm: High Capacity Despite Better Steganalysis”, Lecture Notes in Computer Science, vol. 2137, pp. 289-302, 2001.10.1007/3-540-45496-9_21Search in Google Scholar

S.C.Mukhopadhyay, F.P.Dawson, M.Iwahara and S.Yamada, “A Novel Compact Magnetic Current Limiter for Three Phase Applications”, IEEE Transactions on Magnetics, Vol. 36, No. 5, pp. 3568-3570, September 2000.Search in Google Scholar

S. Yamada, K. Chomsuwan, S.C.Mukhopadhyay, M.Iwahara, M. Kakikawa and I. Nagano, “Detection of Magnetic Fluid Volume Density with a GMR Sensor”, Journal of Magnetics Society of Japan, Vol. 31, No. 2, pp. 44-47, 2007.10.3379/jmsjmag.31.44Search in Google Scholar

Anju Thomas, D. Sugumar, P.T Vanathi” Blind Image Source Separation based on MMCA using Dictionary Technique” International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Volume 2, Issue 2,pp.182-186, 2013.Search in Google Scholar

Amrita Khamrui, J K Mandal” A Genetic Algorithm based Steganography using DiscreteSearch in Google Scholar

Cosine Transformation (GASDCT)” International Conference on Computational Intelligence:Modeling Techniques and Applications(CIMTA),Volume 10, Pages 105–111 2013.10.1016/j.protcy.2013.12.342Search in Google Scholar

Hossein Sheisi, Jafar Mesgarian, and Mostafa Rahmani, “Steganography: Dct Coefficient Replacement Method and Compare With Jsteg Algorithm” International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, pp.458-462, 2012.10.7763/IJCEE.2012.V4.533Search in Google Scholar

Hamdan L. Jaheel and Zou Beiji,A novel approach of combining steganography algorithms,International Journal on Smart Sensing and Intelligent Systems, vol.8, no.1, pp.90-106, 2015.10.21307/ijssis-2017-750 Search in Google Scholar

Wang Tao, Design of digital image encryption algorithm based on mixed chaotic sequences, International Journal on Smart Sensing and Intelligent Systems, vol.7, no.4, pp. 1453 – 1469, 2014.Search in Google Scholar

eISSN:
1178-5608
Lingua:
Inglese
Frequenza di pubblicazione:
Volume Open
Argomenti della rivista:
Engineering, Introductions and Overviews, other