-
1
-
-
0031996445
-
George mason university exploring steganography: Seeing the unseen
-
N. F. Johnson and S. Jajodia, George Mason University, Exploring steganography: Seeing the unseen, IEEE Comput. 2 (1998) 26-34
-
(1998)
IEEE Comput
, vol.2
, pp. 26-34
-
-
Johnson, N.F.1
Jajodia, S.2
-
2
-
-
70350710022
-
Digital image steganography: Survey and analysis of current methods
-
A. Cheddad, J. Condell, K. Curran and P. Kevitt, Digital image steganography: Survey and analysis of current methods, Signal Process. 90 (2010) 727-752
-
(2010)
Signal Process
, vol.90
, pp. 727-752
-
-
Cheddad, A.1
Condell, J.2
Curran, K.3
Kevitt, P.4
-
3
-
-
3042742327
-
Seek and hide: An introduction to steganography
-
N. Provos and P. Honeyman, Seek and hide: An introduction to steganography, IEEE Security Privacy 1 (2003) 32-44
-
(2003)
IEEE Security Privacy
, vol.1
, pp. 32-44
-
-
Provos, N.1
Honeyman, P.2
-
4
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
eds. P. W. L. Fong, R. B€ohme and Rei Safavi-Naini, Lecture Notes in Computer Science, Calgary, Canada, 28-30 June 2010
-
T. Pevný, T. Filler and P. Bas, Using high-dimensional image models to perform highly undetectable steganography, 12th International Workshop, Information Hiding, eds. P. W. L. Fong, R. B€ohme and Rei Safavi-Naini, Lecture Notes in Computer Science, Calgary, Canada, 28-30 June 2010, pp. 161-177
-
12th International Workshop, Information Hiding
, pp. 161-177
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
5
-
-
77951862698
-
Modern steganalysis can detect yass
-
San Jose, CA, 17-21 January 2010 02-01-02-11
-
J. Kodovsky, T. Pevný and J. Fridrick, Modern steganalysis can detect YASS, Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, San Jose, CA, 17-21 January 2010, pp. 02-01-02-11
-
Proc. SPIE, Electronic Imaging, Media Forensics and Security XII
-
-
Kodovsky, J.1
Pevný, T.2
Fridrick, J.3
-
6
-
-
84885941452
-
Hierarchical steganography using novel optimum quantization technique
-
doi: 10.1007/s11760-012-0301-9
-
B. J. Mohd, S. Abed, B. Náami and T. Hayajneh, Hierarchical steganography using novel optimum quantization technique, Signal, Image Video Process, doi: 10.1007/s11760-012-0301-9
-
Signal, Image Video Process
-
-
Mohd, B.J.1
Abed, S.2
Náami, B.3
Hayajneh, T.4
-
7
-
-
50149087873
-
Fpga hardware architecture of the steganographic context technique
-
March 2008
-
E. Gomez-Hernandez, C. Feregrino-Uribe and R. Cumplido, FPGA hardware architecture of the steganographic context technique, 18th Int. Conf. Electronics, Communications and Computers (CONIELECOMP 2008), March 2008, pp. 123-128
-
(2008)
18th Int. Conf. Electronics, Communications and Computers (CONIELECOMP
, pp. 123-128
-
-
Gomez-Hernandez, E.1
Feregrino-Uribe, C.2
Cumplido, R.3
-
8
-
-
84859252029
-
Design and analysis of prototype hardware for secret sharing using 2-D image processing
-
R. Amirtharajan, R. Balaguru and V. Ganesan, Design and analysis of prototype hardware for secret sharing using 2-D image processing, Int. J. Comput. Appl. 4 (2010) 17-22
-
(2010)
Int. J. Comput. Appl
, vol.4
, pp. 17-22
-
-
Amirtharajan, R.1
Balaguru, R.2
Ganesan, V.3
-
9
-
-
84876480614
-
Fpga implementation and energy cost analysis of two light-weight involutional block ciphers targeted to wireless sensor networks
-
doi: 10.1007/s11036-012-0353-7
-
X. Zhang, H. M. Heys and C. Li, FPGA implementation and energy cost analysis of two light-weight involutional block ciphers targeted to wireless sensor networks, Mobile Networks Appl. (2012), doi: 10.1007/s11036-012-0353-7
-
(2012)
Mobile Networks Appl
-
-
Zhang, X.1
Heys, H.M.2
Li, C.3
-
10
-
-
48649102003
-
An overview of image steganography
-
Sandton, South Africa June/July
-
T. Morkel, J. Elo and M. Olivier, An overview of image steganography, The Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, June/July 2005, pp. 1-11
-
(2005)
The Fifth Annual Information Security South Africa Conference (ISSA2005
, pp. 1-11
-
-
Morkel, T.1
Elo, J.2
Olivier, M.3
-
12
-
-
22944435722
-
A secure robust image steganographic model
-
May
-
Y. K. Lee and L. H. Chen, A secure robust image steganographic model, Tenth National Conf. Information Security, Hualien, Taiwan, 5-6 May 2000, pp. 275-284
-
(2000)
Tenth National Conf. Information Security, Hualien, Taiwan
, vol.5-6
, pp. 275-284
-
-
Lee, Y.K.1
Chen, L.H.2
-
13
-
-
84864196452
-
Fpga hardware of the lsb steganography method
-
doi: 10.1109/CITS.2012.6220393
-
B. Mohd, S. Abed, T. Al-Hayajneh and S. Alouneh, FPGA hardware of the LSB steganography method, Int. Conf. Computer, Information and Telecommunication Systems (CITS) (2012), pp. 1-4, doi: 10.1109/CITS.2012.6220393
-
(2012)
Int. Conf. Computer, Information and Telecommunication Systems (CITS
, pp. 1-14
-
-
Mohd, B.1
Abed, S.2
Al-Hayajneh, T.3
Alouneh, S.4
-
14
-
-
84892963560
-
Steganography: Random lsb insertion using discrete logarithm
-
M. Amin, M. Salleh, S. Ibrahim and M. Katmin, Steganography: Random LSB insertion using discrete logarithm, 3rd Int. Conf. Information Technology in Asia (CTA03) (2003), pp. 234-238
-
(2003)
3rd Int. Conf. Information Technology in Asia (CTA03
, pp. 234-238
-
-
Amin, M.1
Salleh, M.2
Ibrahim, S.3
Katmin, M.4
-
15
-
-
84897625394
-
Steganalysis of random lsb insertion using discrete logarithms proposed at cita03
-
PJ, Malaysia, October 2003
-
R. C-W. Phan and H-C. Ling, Steganalysis of random LSB insertion using discrete logarithms proposed at CITA03, Proc. MMU Int. Symp. Information & Communication Technologies (M2USIC 2003), PJ, Malaysia, October 2003, pp. 56-59
-
(2003)
Proc. MMU Int. Symp. Information & Communication Technologies (M2USIC
, pp. 56-59
-
-
Phan, R.C.-W.1
Ling, H.-C.2
-
16
-
-
84874111954
-
Data hiding based on image texture classi-cation, signal, image video process
-
doi: 10.1007/s11760-011-0229-5
-
E. Varsaki, V. Fotopoulos and A. Skodras, Data hiding based on image texture classi-cation, Signal, Image Video Process. Online FirstTM (2011), doi: 10.1007/s11760-011-0229-5
-
(2011)
Online FirstTM
-
-
Varsaki, E.1
Fotopoulos, V.2
Skodras, A.3
-
17
-
-
34547171700
-
Adaptive steganography based on textures
-
D. Herrera-Moro, R. Rodríguez-Colín and C. Feregrino-Uribe, Adaptive steganography based on textures, 17th Int. Conf. Electronics, Communications and Computers (CONIELECOMP'07) (2007), pp. 34-34
-
(2007)
17th Int. Conf. Electronics, Communications and Computers (CONIELECOMP'07
, pp. 34-34
-
-
Herrera-Moro, D.1
Rodríguez-Colín, R.2
Feregrino-Uribe, C.3
-
18
-
-
0029669420
-
A comparative study of texture measures with classication based on featured distributions
-
T. Ojala, M. Pietikäinen and D. Harwood, A comparative study of texture measures with classication based on featured distributions, Pattern Recogn. 29 (1996) 51-59
-
(1996)
Pattern Recogn
, vol.29
, pp. 51-59
-
-
Ojala, T.1
Pietikäinen, M.2
Harwood, D.3
-
19
-
-
0036647193
-
Multiresolution gray-scale and rotation invariant texture classication with local binary patterns
-
T. Ojala, M. Pietikäinen and T. Mäenpää, Multiresolution gray-scale and rotation invariant texture classication with local binary patterns, IEEE Trans. Pattern Anal. Mach. Intell. 24 (2002) 971-987
-
(2002)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.24
, pp. 971-987
-
-
Ojala, T.1
Pietikäinen, M.2
Mäenpää, T.3
-
21
-
-
84857387646
-
Stego system on chip with LFSR based information hiding approach
-
R. Sundararaman and H. N. Upadhyay, Stego system on chip with LFSR based information hiding approach, Int. J. Comput. Appl. 18 (2011) 24-31
-
(2011)
Int. J. Comput. Appl
, vol.18
, pp. 24-31
-
-
Sundararaman, R.1
Upadhyay, H.N.2
-
22
-
-
84857377115
-
Survey and analysis of hardware cryptographic and steganographic systems on fpga
-
S. Rajagopalan and R. Amirtharajan, Survey and analysis of hardware cryptographic and steganographic systems on FPGA, J. Appl. Sci. 12 (2012) 201-210
-
(2012)
J. Appl. Sci
, vol.12
, pp. 201-210
-
-
Rajagopalan, S.1
Amirtharajan, R.2
-
23
-
-
2442504653
-
Design and implementation of a secret key steganographic microarchitecture employing fpga
-
October
-
H. Farouk and M. Saeb, Design and implementation of a secret key steganographic microarchitecture employing FPGA, Asia and South Pacic Design Automation Conference (ASP-DAC), October 2004, pp. 577-578
-
(2004)
Asia and South Pacic Design Automation Conference (ASP-DAC
, pp. 577-578
-
-
Farouk, H.1
Saeb, M.2
-
24
-
-
84859019910
-
Hide and seek in silicon-Performance analysis of quad block equisum hardware steganographic systems
-
S. Rajagopalan, S. Janakiraman, H. N. Upadhyay and K. Thenmozhi, Hide and seek in silicon-Performance analysis of quad block equisum hardware steganographic systems, Int. Conf. Communication Technology and System Design, Vol. 30-2012 (2011), pp. 806-813
-
(2011)
Int. Conf. Communication Technology and System Design 30 2012
, pp. 806-813
-
-
Rajagopalan, S.1
Janakiraman, S.2
Upadhyay, H.N.3
Thenmozhi, K.4
-
27
-
-
84861929653
-
Conguration tool for a wireless sensor network integrated security framework
-
doi: 10.1007/ s10922-011-9219-9228
-
V. Cionca, T. Newe and V. Dǎ;dâr, Conguration tool for a wireless sensor network integrated security framework, J. Network Syst. Manag. 20 (2012) 417-452, doi: 10.1007/ s10922-011-9219-8
-
(2012)
J. Network Syst. Manag
, vol.20
, pp. 417-452
-
-
Cionca, V.1
Newe, T.2
Dǎ, V.3
Dâr4
-
28
-
-
43949144611
-
A security-energy trade-o for authentic aggregation in sensor networks
-
WiMesh 2006 25 28 September 2006
-
E-O. Blass, J. Wilke and M. Zitterbart, A security-energy trade-o for authentic aggregation in sensor networks, 2nd IEEE Workshop on Wireless Mesh Networks, 2006, WiMesh 2006, 25-28 September 2006, pp. 135-137
-
(2006)
2nd IEEE Workshop on Wireless Mesh Networks
, pp. 135-137
-
-
Blass, E.-O.1
Wilke, J.2
Zitterbart, M.3
-
29
-
-
34250334357
-
Energy-memory-security tradeos in distributed sensor networks
-
Canada 22-24 July
-
I. Nikolaidis, M. Barbeau and E. Kranakis, Energy-memory-security tradeos in distributed sensor networks, Proc. Third Int. Conf. Ad-Hoc, Mobile, and Wireless Networks: ADHOC-NOW 2004, Lecture Notes in Computer Science, Vancouver, Canada, 22-24 July 2004, pp. 70-81
-
(2004)
Proc. Third Int. Conf. Ad-Hoc, Mobile, and Wireless Networks: ADHOC-NOW 2004, Lecture Notes in Computer Science, Vancouver
, pp. 70-81
-
-
Nikolaidis, I.1
Barbeau, M.2
Kranakis, E.3
|