-
1
-
-
77955292625
-
Improved Adaptive LSB steganography based on Chaos and Genetic Algorithm
-
Article ID 876946
-
Yu, L., et al.: Improved Adaptive LSB steganography based on Chaos and Genetic Algorithm. EURASIP Journal on Advances in Signal Processing 2010, Article ID 876946 (2010)
-
(2010)
EURASIP Journal on Advances in Signal Processing 2010
-
-
Yu, L.1
-
2
-
-
66249096327
-
Image Authentication by Hiding Large Volume of Data and Secure Message Transmission Technique using Mask (IAHLVDSMTTM)
-
Thapar University, Patiala ISBN:978-981-08-2465-5
-
Ghoshal, N., Mandal, J.K., et al.: Image Authentication by Hiding Large Volume of Data and Secure Message Transmission Technique using Mask (IAHLVDSMTTM). In: Proceedings of IEEE International Advanced Computing Conference IACC 2009, March 6-7. Thapar University, Patiala (2009) ISBN:978-981-08-2465-5
-
(2009)
Proceedings of IEEE International Advanced Computing Conference IACC 2009, March 6-7
-
-
Ghoshal, N.1
Mandal, J.K.2
-
3
-
-
63149091754
-
Masking based Data Hiding and Image Authentication Technique (MDHIAT)
-
Anna University, December ISBN: 978-1-4244-2962-2
-
Ghoshal, N., Mandal, J.K., et al.: Masking based Data Hiding and Image Authentication Technique (MDHIAT). In: Proceedings of 16th International Conference of IEEE on Advanced Computing and Communications ADCOM 2008, Anna University, December 14-17 (2008) ISBN: 978-1-4244-2962-2
-
(2008)
Proceedings of 16th International Conference of IEEE on Advanced Computing and Communications ADCOM 2008
, pp. 14-17
-
-
Ghoshal, N.1
Mandal, J.K.2
-
4
-
-
49949094836
-
A Novel Technique for Image Authentication in Frequency Domain using Discrete Fourier Transformation Technique (IAFDZTT)
-
ISSN 0127-9094
-
Ghoshal, N., Mandal, J.K.: A Novel Technique for Image Authentication in Frequency Domain using Discrete Fourier Transformation Technique (IAFDZTT). Malaysian Journal of Computer Science 21(1), 24-32 (2008) ISSN 0127-9094
-
(2008)
Malaysian Journal of Computer Science
, vol.21
, Issue.1
, pp. 24-32
-
-
Ghoshal, N.1
Mandal, J.K.2
-
5
-
-
67649216409
-
A Bit Level Image Authentication/Secrete Message Transmission Technique (BLIA/SMTT)
-
Association for the Advancement of Modeling and Simulation Technique in Enterprises (AMSE)
-
Ghoshal, N., Mandal, J.K.: A Bit Level Image Authentication/Secrete Message Transmission Technique (BLIA/SMTT). Association for the Advancement of Modeling and Simulation Technique in Enterprises (AMSE), AMSE Journal of Signal Processing and Pattern Recognition 51(4), 1-13 (2008)
-
(2008)
AMSE Journal of Signal Processing and Pattern Recognition
, vol.51
, Issue.4
, pp. 1-13
-
-
Ghoshal, N.1
Mandal, J.K.2
-
6
-
-
44949249676
-
Hiding a large Amount of data with High Security Using Steganography Algorithm
-
ISSN 1549-3636
-
EL-Emam, N.N.: Hiding a large Amount of data with High Security Using Steganography Algorithm. Journal of Computer Science 3(4), 223-232 (2007) ISSN 1549-3636
-
(2007)
Journal of Computer Science
, vol.3
, Issue.4
, pp. 223-232
-
-
El-Emam, N.N.1
-
7
-
-
84947199857
-
-
received July 19, 2005 received in revised form February 15, 2007; accepted February 15, 2007
-
Chang, C.-C., Lin, C.-C., Tseng, C.-S., Tai, W.-L.: Reverssible hiding in DCT based Compressed image (received July 19, 2005), http://www.scincedirect. com (received in revised form February 15, 2007; accepted February 15, 2007)
-
Reverssible Hiding in DCT Based Compressed Image
-
-
Chang, C.-C.1
Lin, C.-C.2
Tseng, C.-S.3
Tai, W.-L.4
-
9
-
-
0037524382
-
Detection of LSB steganography via sample pair analysis
-
Dumitrescu, S., Xiaolin, W., Wang, Z.: Detection of LSB steganography via sample pair analysis. IEEE Trans. on Signal Processing 51(7), 1995-2007 (2003)
-
(2003)
IEEE Trans. on Signal Processing
, vol.51
, Issue.7
, pp. 1995-2007
-
-
Dumitrescu, S.1
Xiaolin, W.2
Wang, Z.3
-
10
-
-
0035167458
-
Analysis of LSB based image steganography techniques
-
Chandramouli, R., Memon, N.: Analysis of LSB based image steganography techniques. In: Proc. of ICIP, Thissaloniki, Greece, pp. 1019-1022 (2001)
-
(2001)
Proc. of ICIP, Thissaloniki, Greece
, pp. 1019-1022
-
-
Chandramouli, R.1
Memon, N.2
-
12
-
-
0032223822
-
A robust image authentication method surviving JPEG lossy compression
-
January
-
Lin, C.Y., Chang, S.F.: A robust image authentication method surviving JPEG lossy compression. In: Proc. SPIE, San Jose, vol. 3312, pp. 296-307 (January 1998)
-
(1998)
Proc. SPIE, San Jose
, vol.3312
, pp. 296-307
-
-
Lin, C.Y.1
Chang, S.F.2
-
13
-
-
0347172700
-
-
Version 5, Original release: October Signal and Image Processing Institute, University of Southern California, Department of Electrical Engineering, last accessed on January 20, 2011
-
Weber, A.G.: The USC-SIPI Image Database: Version 5, Original release: October 1997, Signal and Image Processing Institute, University of Southern California, Department of Electrical Engineering, http://sipi.usc.edu/database/ (last accessed on January 20, 2011)
-
(1997)
The USC-SIPI Image Database
-
-
Weber, A.G.1
|