-
1
-
-
50649119706
-
A discrete wavelet transform based technique for image data hiding
-
Egypt, 18-20 March 2008
-
Abdelwahab, A. and Hassan, L. (2008) 'A discrete wavelet transform based technique for image data hiding', Proceedings of 25th National Radio Science Conference, NRSC 2008, Egypt, 18-20 March 2008, pp. 1-9.
-
(2008)
Proceedings of 25th National Radio Science Conference, NRSC 2008
, pp. 1-9
-
-
Abdelwahab, A.1
Hassan, L.2
-
2
-
-
84893000417
-
-
Altera Inc., (accessed 1 March 2013)
-
Altera Inc., Quartus II Introduction Using Verilog Designs [online] http://ftp.altera.com/up/pub/Altera-Material/9.1/Tutorials/Verilog/ Quartus-II-Introduction.pdf (accessed 1 March 2013).
-
Quartus II Introduction Using Verilog Designs
-
-
-
3
-
-
84892963560
-
Steganography: Random LSB insertion using discrete logarithm
-
Amin, M., Salleh, M., Ibrahim, S. and Katmin, M. (2003) 'Steganography: random LSB insertion using discrete logarithm', 3rd International Conference on Information Technology in Asia (CTA03), pp. 234-238.
-
(2003)
3rd International Conference on Information Technology in Asia (CTA03)
, pp. 234-238
-
-
Amin, M.1
Salleh, M.2
Ibrahim, S.3
Katmin, M.4
-
4
-
-
84859252029
-
Design and analysis of prototype hardware for secret sharing using 2-D image processing
-
July
-
Amirtharajan, R., Balaguru, R. and Ganesan, V. (2010) 'Design and analysis of prototype hardware for secret sharing using 2-D image processing', International Journal of Computer Applications, July, Vol. 4, No. 4, pp. 17-22.
-
(2010)
International Journal of Computer Applications
, vol.4
, Issue.4
, pp. 17-22
-
-
Amirtharajan, R.1
Balaguru, R.2
Ganesan, V.3
-
5
-
-
70350710022
-
Digital image steganography: Survey and analysis of current methods
-
6 March
-
Cheddad, A., Condell, J., Curran, K. and Kevitt, P. (2010) 'Digital image steganography: survey and analysis of current methods', Signal Processing, 6 March, Vol. 90, No. 3, pp. 727-752.
-
(2010)
Signal Processing
, vol.90
, Issue.3
, pp. 727-752
-
-
Cheddad, A.1
Condell, J.2
Curran, K.3
Kevitt, P.4
-
6
-
-
49149097304
-
A DWT based approach for image steganography
-
Chen, P. and Lin, H. (2006) 'A DWT based approach for image steganography', International Journal of Applied Science and Engineering, Vol. 3, No. 4, pp. 275-290.
-
(2006)
International Journal of Applied Science and Engineering
, vol.3
, Issue.4
, pp. 275-290
-
-
Chen, P.1
Lin, H.2
-
7
-
-
33846993721
-
Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation
-
Chen, W.Y. (2007) 'Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation', Applied Mathematics and Computation, Vol. 185, No. 1, pp. 432-448.
-
(2007)
Applied Mathematics and Computation
, vol.185
, Issue.1
, pp. 432-448
-
-
Chen, W.Y.1
-
8
-
-
2442504653
-
Design and implementation of a secret key steganographic micro-architecture employing FPGA
-
October
-
Farouk, H. and Saeb, M. (2004) 'Design and implementation of a secret key steganographic micro-architecture employing FPGA', Asia and South Pacific Design Automation Conference (ASP-DAC) 2004, October, pp. 577-578.
-
(2004)
Asia and South Pacific Design Automation Conference (ASP-DAC) 2004
, pp. 577-578
-
-
Farouk, H.1
Saeb, M.2
-
9
-
-
77957358562
-
Steganographic method based on wavelets and center weighted median filter
-
Gallegos-Funes, F., Carvajal-Gamez, B., Lopez-Bonilla, J. and Ponomaryov, V. (2010) 'Steganographic method based on wavelets and center weighted median filter', International Kharkov Symposium on Physics and Engineering of Microwaves, Millimeter and Submillimeter Waves (MSMW), pp. 1-3.
-
(2010)
International Kharkov Symposium on Physics and Engineering of Microwaves, Millimeter and Submillimeter Waves (MSMW)
, pp. 1-3
-
-
Gallegos-Funes, F.1
Carvajal-Gamez, B.2
Lopez-Bonilla, J.3
Ponomaryov, V.4
-
10
-
-
50149087873
-
FPGA hardware architecture of the steganographic context technique
-
March
-
Gomez-Hernandez, E., Feregrino-Uribe, C. and Cumplido, R. (2008) 'FPGA hardware architecture of the steganographic context technique', 18th International Conference on Electronics, Communications and Computers, 2008, CONIELECOMP 2008, March, pp. 123-128.
-
(2008)
18th International Conference on Electronics, Communications and Computers, 2008, CONIELECOMP 2008
, pp. 123-128
-
-
Gomez-Hernandez, E.1
Feregrino-Uribe, C.2
Cumplido, R.3
-
11
-
-
34547171700
-
Adaptive steganography based on textures
-
Herrera-Moro, D., Rodríguez-Colín, R. and Feregrino-Uribe, C. (2007) 'Adaptive steganography based on textures', 17th International Conference on Electronics, Communications and Computers (CONIELECOMP'07), pp. 34-34.
-
(2007)
17th International Conference on Electronics, Communications and Computers (CONIELECOMP'07)
, pp. 34-34
-
-
Herrera-Moro, D.1
Rodríguez-Colín, R.2
Feregrino-Uribe, C.3
-
12
-
-
0031996445
-
Exploring steganography: Seeing the unseen
-
February, George Mason University, Los Alamitos, USA
-
Johnson, N.F. and Jajodia, S. (1998) Exploring steganography: seeing the unseen', IEEE Computers, February, pp. 26-34, George Mason University, Los Alamitos, USA.
-
(1998)
IEEE Computers
, pp. 26-34
-
-
Johnson, N.F.1
Jajodia, S.2
-
13
-
-
77952377607
-
Performance comparison of DCT and Walsh transform for steganography
-
India
-
Kekre, H., Athawale, A., Halankar, P. and Banura, V. (2010) 'Performance comparison of DCT and Walsh transform for steganography', ICWET Conference, India, pp. 81-88.
-
(2010)
ICWET Conference
, pp. 81-88
-
-
Kekre, H.1
Athawale, A.2
Halankar, P.3
Banura, V.4
-
14
-
-
84892994767
-
A frequency domain steganography using Z Transform (FDSZT)
-
Rajagiri School of Engineering & Technology, 22-23 December, Kochin, arXiv:1202.4245
-
Mandal, J. (2011) 'A frequency domain steganography using Z Transform (FDSZT)', International Workshop on Embedded Computing and Communication System (IWECC 2011), Rajagiri School of Engineering & Technology, 22-23 December, Kochin, arXiv:1202.4245.
-
(2011)
International Workshop on Embedded Computing and Communication System (IWECC 2011)
-
-
Mandal, J.1
-
15
-
-
84864196452
-
FPGA hardware of the LSB steganography method
-
14-16 May, 4
-
Mohd, B.J., Abed, S., Al-Hayajneh, T. and Alouneh, S. (2012a) 'FPGA hardware of the LSB steganography method', 2012 International Conference on Computer, Information and Telecommunication Systems (CITS), 14-16 May, pp.1, 4.
-
(2012)
2012 International Conference on Computer, Information and Telecommunication Systems (CITS)
, pp. 1
-
-
Mohd, B.J.1
Abed, S.2
Al-Hayajneh, T.3
Alouneh, S.4
-
16
-
-
84885941452
-
Hierarchical steganography using novel optimum quantization technique
-
March, DOI: 10.1007/s11760-012-0301-9
-
Mohd, B.J., Abed, S., Na'ami, B. and Hayajneh, T. (2012b) 'Hierarchical steganography using novel optimum quantization technique', Signal, Image and Video Processing, March, Vol. 7, No. 6, pp. 1029-1040, DOI: 10.1007/s11760-012- 0301-9.
-
(2012)
Signal, Image and Video Processing
, vol.7
, Issue.6
, pp. 1029-1040
-
-
Mohd, B.J.1
Abed, S.2
Na'Ami, B.3
Hayajneh, T.4
-
17
-
-
48649102003
-
An overview of image steganography
-
July, Sandton, South Africa
-
Morkel, T., Eloff, J. and Olivier, M. (2005) 'An overview of image steganography', The Fifth Annual Information Security South Africa Conference (ISSA2005), July, Sandton, South Africa.
-
(2005)
The Fifth Annual Information Security South Africa Conference (ISSA2005)
-
-
Morkel, T.1
Eloff, J.2
Olivier, M.3
-
18
-
-
3042742327
-
Seek and hide: An introduction to steganography'
-
June
-
Provos, N. and Honeyman, P. (2003) 'Seek and hide: an introduction to steganography', IEEE Security and Privacy, June, Vol. 1, No. 3, pp. 32-44.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.3
, pp. 32-44
-
-
Provos, N.1
Honeyman, P.2
-
19
-
-
84928174250
-
A secure image steganography using LSB, DCT and compression techniques on raw images
-
Raja, K., Chowdary, V.R. and Patnaik, L. (2005) 'A secure image steganography using LSB, DCT and compression techniques on raw images', 3rd International Conference on Intelligent Sensing and Information Processing, pp. 170-176.
-
(2005)
3rd International Conference on Intelligent Sensing and Information Processing
, pp. 170-176
-
-
Raja, K.1
Chowdary, V.R.2
Patnaik, L.3
-
20
-
-
84857377115
-
Survey and analysis of hardware cryptographic and steganographic systems on FPGA
-
Rajagopalan, S. and Amirtharajan, R. (2012) 'Survey and analysis of hardware cryptographic and steganographic systems on FPGA', Journal of Applied Sciences, Vol. 12, No. 3, pp. 201-210.
-
(2012)
Journal of Applied Sciences
, vol.12
, Issue.3
, pp. 201-210
-
-
Rajagopalan, S.1
Amirtharajan, R.2
-
22
-
-
84857387646
-
Stego system on chip with LFSR based information hiding approach
-
March
-
Sundararaman, R. and Upadhyay, H.N. (2011) 'Stego system on chip with LFSR based information hiding approach', International Journal of Computer Applications, March, Vol. 18, No. 2, pp. 24-31.
-
(2011)
International Journal of Computer Applications
, vol.18
, Issue.2
, pp. 24-31
-
-
Sundararaman, R.1
Upadhyay, H.N.2
-
23
-
-
30144433552
-
Optimized transmission of JPEG2000 streams over wireless channels
-
January
-
Thomos, N., Boulgouris, N.V. and Strintzis, M.G. (2006) 'Optimized transmission of JPEG2000 streams over wireless channels', IEEE Transaction on Image Processing, January, Vol. 15, No. 1, pp. 54-67.
-
(2006)
IEEE Transaction on Image Processing
, vol.15
, Issue.1
, pp. 54-67
-
-
Thomos, N.1
Boulgouris, N.V.2
Strintzis, M.G.3
-
24
-
-
84874111954
-
Data hiding based on image texture classification
-
Online First™, 18 May, Springer, Berlin, DOI: 10.1007/s11760-011- 0229-5
-
Varsaki, E., Fotopoulos, V. and Skodras, A. (2011) 'Data hiding based on image texture classification', Signal, Image and Video Processing, Online First™, 18 May, Springer, Berlin, DOI: 10.1007/s11760-011-0229-5.
-
(2011)
Signal, Image and Video Processing
-
-
Varsaki, E.1
Fotopoulos, V.2
Skodras, A.3
-
25
-
-
80052257231
-
An analysis of LSB & DCT based steganography
-
April
-
Walia, E., Jain, P. and Navdeep, N. (2010) 'An analysis of LSB & DCT based steganography', Global Journal of Computer Science and Technology, April, Vol. 10, No. 1, pp. 4-8.
-
(2010)
Global Journal of Computer Science and Technology
, vol.10
, Issue.1
, pp. 4-8
-
-
Walia, E.1
Jain, P.2
Navdeep, N.3
-
27
-
-
24144467979
-
-
(v.8), 13 June, (accessed 1 March 2013)
-
Xilinx Inc. (2008) Spartan-II FPGA Family Data Sheet, (v.8), 13 June [online] http://www.xilinx.com/support/documentation/data-sheets/ds001.pdf (accessed 1 March 2013).
-
(2008)
Spartan-II FPGA Family Data Sheet
-
-
|