-
1
-
-
3042742327
-
-
Niels Provos, Peter Honeyman, Hide and Seek: An Introduction to Steganography IEEE Computer Society, p32-44, 2003.
-
Niels Provos, Peter Honeyman, "Hide and Seek: An Introduction to Steganography" IEEE Computer Society, p32-44, 2003.
-
-
-
-
2
-
-
84906975223
-
Exploring Steganography: Seeing The Unseen
-
Feb
-
Jhonson, N F and Jajodia, S "Exploring Steganography: Seeing The Unseen", IEEE, Computer, Feb. 1998.
-
(1998)
IEEE, Computer
-
-
Jhonson, N.F.1
Jajodia, S.2
-
3
-
-
0343867221
-
Applications for Data Hiding
-
W. Bender, W Butera, D Gruhl, R Hwang, F J Paiz, S Pogreb "Applications for Data Hiding" IBM Systems Journal, vol. 39, no. 3 and 4, 2000.
-
(2000)
IBM Systems Journal
, vol.39
, Issue.3 AND 4
-
-
Bender, W.1
Butera, W.2
Gruhl, D.3
Hwang, R.4
Paiz, F.J.5
Pogreb, S.6
-
6
-
-
33646852111
-
An Evaluation of Image Based Steganography Methods
-
Fall
-
Kevin Curran, "An Evaluation of Image Based Steganography Methods" International Journal of Digital Evidence vol. 2, no. 2, Fall 2003.
-
(2003)
International Journal of Digital Evidence
, vol.2
, Issue.2
-
-
Curran, K.1
-
7
-
-
47649085043
-
A Secure Image Steganography on Raw Images
-
11 Nov
-
K B Raja, C R Chowdary, Venugopal K R, L M Patnaik, "A Secure Image Steganography on Raw Images", International Journal of Computer Science and Network Security, Vol. 5, pp. 123-129 11 Nov 2005.
-
(2005)
International Journal of Computer Science and Network Security
, vol.5
, pp. 123-129
-
-
Raja, K.B.1
Chowdary, C.R.2
Venugopal, K.R.3
Patnaik, L.M.4
-
8
-
-
33645975838
-
-
Abdelkader Houda and Mahmoud R. EI-Sakka, A step towards Practical Steganography Systems ICIAR, LNCS3656.PP. 1158-1166, 2005.
-
Abdelkader Houda and Mahmoud R. EI-Sakka, "A step towards Practical Steganography Systems" ICIAR, LNCS3656.PP. 1158-1166, 2005.
-
-
-
-
9
-
-
10844269694
-
-
M Fahmy Tolba,. Al-Said Ghonemy, Ismail Abdoul-Hameed Taha, Amal Said Khalifa, High Capacity Image Steganography Using Wavelet-Based Fusion Computer and Communications, Proceedings, ISCC 2004, Ninth International Symposium, 1, 28 June-1, pp. 430-435, July 2004.
-
M Fahmy Tolba,. Al-Said Ghonemy, Ismail Abdoul-Hameed Taha, Amal Said Khalifa," High Capacity Image Steganography Using Wavelet-Based Fusion" Computer and Communications, Proceedings, ISCC 2004, Ninth International Symposium, vol.: 1, 28 June-1, pp. 430-435, July 2004.
-
-
-
-
10
-
-
3042547051
-
JPEG Compression Image Steganography Using Wavelet Transform
-
5-7 April
-
Jainyun Xu,Andrew H Sung, Peipei Shi, Qingzhong Liu, "JPEG Compression Image Steganography Using Wavelet Transform" Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), vol., 2, pp. 704-708. 5-7 April 2004.
-
(2004)
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04)
, vol.2
, pp. 704-708
-
-
Xu, J.1
Sung, A.H.2
Shi, P.3
Liu, Q.4
-
11
-
-
47649117795
-
High Capacity Image Steganography System Using WaveletZerotree Tra nsations on engineering, computing and technology
-
December
-
Yuk Ying Chung, Yong Sun, "High Capacity Image Steganography System Using WaveletZerotree" Tra nsations on engineering, computing and technology, World Enformatika Society, Enformatika V1 December 2004.
-
(2004)
World Enformatika Society, Enformatika
-
-
Ying Chung, Y.1
Sun, Y.2
-
12
-
-
14244261626
-
The Best Transform in the Replacement Coefficients and The Size of the Payload Relationship Sense
-
San Antonio, Texas, pp
-
Eric A Silva, Sos S Agaian, "The Best Transform in the Replacement Coefficients and The Size of the Payload Relationship Sense" IS&T's Archiving Conference, San Antonio, Texas, pp. 199-203,2004.
-
(2004)
IS&T's Archiving Conference
, pp. 199-203
-
-
Silva, E.A.1
Agaian, S.S.2
-
13
-
-
47649092849
-
Using Integer Wavelet Transform in Colored Image-Steganography
-
July
-
M F Tolba, M A Ghonemy, I.A. Taha, and A.S. Khalifa, "Using Integer Wavelet Transform in Colored Image-Steganography" IJICIS vol. 4 No. 2 July 2004.
-
(2004)
IJICIS
, vol.4
, Issue.2
-
-
Tolba, M.F.1
Ghonemy, M.A.2
Taha, I.A.3
Khalifa, A.S.4
-
14
-
-
0001849187
-
Attacks on Steganographic Systems
-
Springer-Verlag, Berlin, pp
-
Westfeld, A Pfitzmann, "Attacks on Steganographic Systems" Lecture Notes in Computer Science, vol. 1768, Springer-Verlag, Berlin, pp. 61-75, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.1768
, pp. 61-75
-
-
Westfeld, A.P.1
-
15
-
-
84954213268
-
-
Nedeljko Cvejic, Tapio Seppanen, A Wavelet LSB Insertion Algorithm for High Capacity Audio Steganography -proceedings of IEEE digital signal processing workshop 2002.
-
Nedeljko Cvejic, Tapio Seppanen, "A Wavelet LSB Insertion Algorithm for High Capacity Audio Steganography" -proceedings of IEEE digital signal processing workshop 2002.
-
-
-
-
16
-
-
0034430895
-
Exploring on Steganography For Low Bit Rate Wavelet Based Coder In Image Retrieval System
-
Areepongsa, N Kaewkamnerd, YF Syed, and K R Rao, "Exploring on Steganography For Low Bit Rate Wavelet Based Coder In Image Retrieval System " In Proc. of TENCON 2000, pp. 1-6, 2000.
-
(2000)
Proc. of TENCON
, pp. 1-6
-
-
Areepongsa1
Kaewkamnerd, N.2
Syed, Y.F.3
Rao, K.R.4
-
17
-
-
0032225081
-
-
JJ. Chae, B.S. Manjunath, A Robust Embedded Data from Wavelet Coefficients SPIE: Storage and Retrieval for Image and Video Databases VI, 3312, San Jose CA, pp. 308-317, Jan 1998.
-
JJ. Chae, B.S. Manjunath, "A Robust Embedded Data from Wavelet Coefficients " SPIE: Storage and Retrieval for Image and Video Databases VI, 3312, San Jose CA, pp. 308-317, Jan 1998.
-
-
-
|