메뉴 건너뛰기




Volumn 5, Issue 11, 2010, Pages 1776-1786

Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem

Author keywords

Cryptography; Data hidden; General regression neural cryptosystem (GRNN); Remote sensing image; Steganography

Indexed keywords


EID: 78649273195     PISSN: 19921950     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (35)

References (48)
  • 2
    • 74349117323 scopus 로고    scopus 로고
    • A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm
    • Ahmed MA, Kiah MLM, Zaidan BB, Zaidan AA (2010). A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm. J. Appl. Sci., 10(1): 59-64.
    • (2010) J. Appl. Sci , vol.10 , Issue.1 , pp. 59-64
    • Ahmed, M.A.1    Kiah, M.L.M.2    Zaidan, B.B.3    Zaidan, A.A.4
  • 3
    • 78049468900 scopus 로고    scopus 로고
    • Securing Electronic Medical Records Transmissions over Unsecured Communications: An Overview for Better Medical Governance
    • Alanazi HO, Jalab HA, Zaidan BB, Zaidan AA, Alam, Gazi M (2010). Securing Electronic Medical Records Transmissions over Unsecured Communications: An Overview for Better Medical Governance. J. Medicinal Plants Res., 4(19): 2059-2074.
    • (2010) J. Medicinal Plants Res , vol.4 , Issue.19 , pp. 2059-2074
    • Alanazi, H.O.1    Jalab, H.A.2    Zaidan, B.B.3    Zaidan, A.A.4    Alam5    Gazi, M.6
  • 6
    • 77953709219 scopus 로고    scopus 로고
    • A soft computing approach for modeling of severity of faults in software systems
    • Ardil E, Sandhu PS (2010). A soft computing approach for modeling of severity of faults in software systems. Int. J. Phys. Sci., 5(2): 074-085.
    • (2010) Int. J. Phys. Sci , vol.5 , Issue.2 , pp. 074-085
    • Ardil, E.1    Sandhu, P.S.2
  • 7
    • 84857780639 scopus 로고    scopus 로고
    • Adoption of tax e-filing: A conceptual paper
    • Azmi AAC, Kamarulzaman Y (2010). Adoption of tax e-filing: A conceptual paper. Afr. J. Bus. Manage., 4(5): 599-603.
    • (2010) Afr. J. Bus. Manage , vol.4 , Issue.5 , pp. 599-603
    • Azmi, A.A.C.1    Kamarulzaman, Y.2
  • 8
    • 77953508901 scopus 로고    scopus 로고
    • Performance of ANN in determination of unstable points in leveling networks
    • Celik CT (2010). Performance of ANN in determination of unstable points in leveling networks. Int. J. Phys. Sci., 5(5): 401-407.
    • (2010) Int. J. Phys. Sci , vol.5 , Issue.5 , pp. 401-407
    • Celik, C.T.1
  • 9
    • 78649315073 scopus 로고    scopus 로고
    • 8th International Student Conference on Electrical Engineering
    • Dobsicek M (2004). Extended steganographic system. 8th International Student Conference on Electrical Engineering.
    • (2004) Extended Steganographic System
    • Dobsicek, M.1
  • 10
    • 44949249676 scopus 로고    scopus 로고
    • Hiding a Large Amount of Data with High Security Using Steganography Algorithm
    • EL-Emam NN (2007). Hiding a Large Amount of Data with High Security Using Steganography Algorithm J. Comput. Sci., 4(3): 223-232.
    • (2007) J. Comput. Sci , vol.4 , Issue.3 , pp. 223-232
    • El-Emam, N.N.1
  • 13
    • 0001935107 scopus 로고
    • What's wrong with mean-squared error? Digital images and human vision
    • Girod B (1993). What's wrong with mean-squared error? Digital images and human vision, MIT Press, pp. 207-220.
    • (1993) MIT Press , pp. 207-220
    • Girod, B.1
  • 14
    • 77949295218 scopus 로고    scopus 로고
    • Outlier detection for geodetic nets using ADALINE learning algorithm
    • Gullu M, Yilmaz I (2010). Outlier detection for geodetic nets using ADALINE learning algorithm. Sci. Res. Essays, 5(5): 440-447.
    • (2010) Sci. Res. Essays , vol.5 , Issue.5 , pp. 440-447
    • Gullu, M.1    Yilmaz, I.2
  • 15
    • 77954499630 scopus 로고    scopus 로고
    • Information and communication technology for participatory based decision-making-E-management for administrative efficiency in Higher Education
    • Hashim F, Alam GM, Siraj S (2010). Information and communication technology for participatory based decision-making-E-management for administrative efficiency in Higher Education. Int. J. Phys. Sci., 5(4): 383-392.
    • (2010) Int. J. Phys. Sci , vol.5 , Issue.4 , pp. 383-392
    • Hashim, F.1    Alam, G.M.2    Siraj, S.3
  • 16
    • 77954824252 scopus 로고    scopus 로고
    • On the capacity and security of steganography approaches: An overview
    • Hmood AK, Jalab HA, Kasirun ZM, Zaidan BB, Zaidan AA (2010b). On the capacity and security of steganography approaches: An overview." J. Appl. Sci., 10(16): 1825-1833.
    • (2010) J. Appl. Sci , vol.10 , Issue.16 , pp. 1825-1833
    • Hmood, A.K.1    Jalab, H.A.2    Kasirun, Z.M.3    Zaidan, B.B.4    Zaidan, A.A.5
  • 18
    • 77954829600 scopus 로고    scopus 로고
    • An overview on hiding information technique in images
    • Hmood AK, Zaidan BB, Zaidan AA, Jalab HA (2010a). An overview on hiding information technique in images. J. Appl. Sci., 10(18): 2094-2100.
    • (2010) J. Appl. Sci , vol.10 , Issue.18 , pp. 2094-2100
    • Hmood, A.K.1    Zaidan, B.B.2    Zaidan, A.A.3    Jalab, H.A.4
  • 19
    • 67650680126 scopus 로고    scopus 로고
    • The role of perceived usefulness, perceived ease of use, security and privacy, and customer attitude to engender customer adaptation in the context of electronic banking
    • Jahangir N, Begum N (2008). The role of perceived usefulness, perceived ease of use, security and privacy, and customer attitude to engender customer adaptation in the context of electronic banking. Afri. J. Bus. Manage., 2(1): 032-040.
    • (2008) Afri. J. Bus. Manage , vol.2 , Issue.1 , pp. 032-040
    • Jahangir, N.1    Begum, N.2
  • 21
    • 70350050538 scopus 로고    scopus 로고
    • Adaptive lifting based image compression scheme for narrow band transmission system
    • Kanvel N, Monie EC (2009). Adaptive lifting based image compression scheme for narrow band transmission system. Int. J. Phys. Sci., 4(4): 194-164.
    • (2009) Int. J. Phys. Sci , vol.4 , Issue.4 , pp. 194-164
    • Kanvel, N.1    Monie, E.C.2
  • 24
    • 84857781088 scopus 로고    scopus 로고
    • An empirical study of on-line tax filing acceptance model: Integrating TAM and TPB
    • Lu CT, Huang SY, Lo PY (2010). An empirical study of on-line tax filing acceptance model: Integrating TAM and TPB. Afr. J. Bus. Manage., 4(5): 800-810.
    • (2010) Afr. J. Bus. Manage , vol.4 , Issue.5 , pp. 800-810
    • Lu, C.T.1    Huang, S.Y.2    Lo, P.Y.3
  • 25
    • 0036566725 scopus 로고    scopus 로고
    • Hybrid digital-analog (HDA) joint source-channel codes for broadcasting and robust communications
    • Mittal U, Phamdo N (2002). Hybrid digital-analog (HDA) joint source-channel codes for broadcasting and robust communications. IEEE Transactions on Information Theory, 48(5).
    • (2002) IEEE Transactions On Information Theory , vol.48 , Issue.5
    • Mittal, U.1    Phamdo, N.2
  • 27
    • 77952268534 scopus 로고    scopus 로고
    • Challenges of Hidden Data in the Unused Area Two within Executable Files
    • Naji AW, Zaidan AA, Zaidan BB (2009). Challenges of Hidden Data in the Unused Area Two within Executable Files. J. Comput. Sci., 5(11): 890-897.
    • (2009) J. Comput. Sci , vol.5 , Issue.11 , pp. 890-897
    • Naji, A.W.1    Zaidan, A.A.2    Zaidan, B.B.3
  • 30
    • 63649141397 scopus 로고    scopus 로고
    • Hiding data in DNA
    • Shimanovsky B, Feng J, Potkonjak M Eds., Heidelberg, Springer
    • Shimanovsky B, Feng J, Potkonjak M Eds. (2003). Hiding data in DNA. Information Hiding. Heidelberg, Springer.
    • (2003) Information Hiding
  • 32
    • 78649259743 scopus 로고    scopus 로고
    • Information Security and Data Breach Notification Safeguards, Library of Congress Washington DC Congressional Research Service
    • Stevens GM, Attorney L (2007). Information Security and Data Breach Notification Safeguards, Library of Congress Washington DC Congressional Research Service.
    • (2007)
    • Stevens, G.M.1    Attorney, L.2
  • 33
    • 77953587765 scopus 로고    scopus 로고
    • Application of Neural Network models on analysis of prismatic structures
    • Tayi N (2010). Application of Neural Network models on analysis of prismatic structures. Sci. Res. Essays, 5(9): 978-989.
    • (2010) Sci. Res. Essays , vol.5 , Issue.9 , pp. 978-989
    • Tayi, N.1
  • 35
    • 0032657829 scopus 로고    scopus 로고
    • Spatial filter selection for illumination-invariant color texture discrimination
    • Thai B, Healey G (1999). Spatial filter selection for illumination-invariant color texture discrimination. Computer Vision and Pattern Recognition, 2(6): 23-06.
    • (1999) Computer Vision and Pattern Recognition , vol.2 , Issue.6 , pp. 23-06
    • Thai, B.1    Healey, G.2
  • 37
    • 8644245233 scopus 로고    scopus 로고
    • Unifying statistical texture classification frameworks
    • Varma M (2004). Unifying statistical texture classification frameworks. Image and Vision Computing, 22: 1175-1183.
    • (2004) Image and Vision Computing , vol.22 , pp. 1175-1183
    • Varma, M.1
  • 40
    • 0036288342 scopus 로고    scopus 로고
    • Why is image quality assessment so difficult?
    • Wang Z, Bovik AC, Lu L (2002a). Why is image quality assessment so difficult?, IEEE; 1999.
    • (2002) IEEE , pp. 1999
    • Wang, Z.1    Bovik, A.C.2    Lu, L.3
  • 41
    • 0348170824 scopus 로고    scopus 로고
    • Video quality assessment based on structural distortion measurement
    • Wang Z, Lu L, Bovik AC (2004). Video quality assessment based on structural distortion measurement. Signal processing: Image communication 19(2): 121-132.
    • (2004) Signal Processing: Image Communication , vol.19 , Issue.2 , pp. 121-132
    • Wang, Z.1    Lu, L.2    Bovik, A.C.3
  • 43
    • 77954755662 scopus 로고    scopus 로고
    • A novel 3D spatial neighbor points coupling surface modeling method for scattered points
    • Xu H, Hu Y, Chen Y (2010). A novel 3D spatial neighbor points coupling surface modeling method for scattered points. Int. J. Phys. Sci., 5(4): 313-320.
    • (2010) Int. J. Phys. Sci , vol.5 , Issue.4 , pp. 313-320
    • Xu, H.1    Hu, Y.2    Chen, Y.3
  • 45
    • 77954826595 scopus 로고    scopus 로고
    • Investigate the Capability of Applying Hidden Data in Text File: An Overview
    • Zaidan AA, Zaidan BB, Al-Fraja AK, Jalab HA (2010b). Investigate the Capability of Applying Hidden Data in Text File: An Overview. J. Appl. Sci., 10(17): 1916-1922.
    • (2010) J. Appl. Sci , vol.10 , Issue.17 , pp. 1916-1922
    • Zaidan, A.A.1    Zaidan, B.B.2    Al-Fraja, A.K.3    Jalab, H.A.4
  • 46
    • 77954833269 scopus 로고    scopus 로고
    • An Overview: Theoretical and Mathematical Perspectives for Advance Encryption Standard/Rijndael
    • Zaidan AA, Zaidan BB, Al-Frajat AK, Jalab HA (2010c). An Overview: Theoretical and Mathematical Perspectives for Advance Encryption Standard/Rijndael. J. Appl. Sci., 10(18): 2161-2167.
    • (2010) J. Appl. Sci , vol.10 , Issue.18 , pp. 2161-2167
    • Zaidan, A.A.1    Zaidan, B.B.2    Al-Frajat, A.K.3    Jalab, H.A.4
  • 47
    • 77954783981 scopus 로고    scopus 로고
    • On the Differences between Hiding Information and Cryptography Techniques: An Overview
    • Zaidan BB, Zaidan AA, Al-Frajat AK, Jalab HA (2010d). On the Differences between Hiding Information and Cryptography Techniques: An Overview. J. Appl. Sci., 10(15): 1650-1655.
    • (2010) J. Appl. Sci , vol.10 , Issue.15 , pp. 1650-1655
    • Zaidan, B.B.1    Zaidan, A.A.2    Al-Frajat, A.K.3    Jalab, H.A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.