Have a personal or library account? Click to login
Open Access
|Mar 2015

References

  1. Niels Provos and Peter Honeyman “Hide and Seek: An Introduction to Steganography” , IEEE Computer Society ,Vol.1,No.3, 2003,pp.32-44.10.1109/MSECP.2003.1203220
  2. Philip Bateman and Dr. Hans “Image Steganography and Steganalysis”, M.S., Department of Computing Faculty of Engineering and Physical Sciences, University of Surrey Guildford Surrey, United Kingdom, 2008.
  3. Hossein Sheisi, Jafar Mesgarian, and Mostafa Rahmani “Steganography: Dct Coefficient Replacement Method and Compare With JSteg Algorithm “,International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, August 201210.7763/IJCEE.2012.V4.533
  4. Vijay and Vishal” A Steganography Algorithm for Hiding Image in Image by Improved LSB Substitution by Minimize Detection”, Theoretical and Applied Information Technology, Vol. 36, No.1,2012
  5. Mohamed Amin, Hatem M. Abdullkader, Hani M. Ibrahem, and Ahmed S. Sakr1”A Steganographic Method Based on DCT and New Quantization Technique”, International Journal of Network Security, Vol.16, No.3, PP.214-219, May 2014
  6. [6]Ramandeep Kaur Toor and Ramanjot Kaur”A Steganographic Method Based Upon JPEG and Quantization Table Modification”, International Journal of Information Technology and Knowledge Management ,NO.1,Vol.6, pp. 19-21, 2012
  7. Mohit Kumar Goel & Neelu Jain “A Novel Steganographic Technique Based on LSB-DCT Approach” , in National Conference on Emerging Trends in Information and Computing Technologies NCETICT, 2012.
  8. Chan, C.K. and Cheng. L.M. “Hiding Data in Image by Simple LSB Substitution”, Pattern Recognition, No.3, Vol.37, pp. 469 – 474, 2004.10.1016/j.patcog.2003.08.007
  9. Chang,C.C and Tseng, H.W. “A Steganographic Method for Digital Images Using Side Match”, Pattern Recognition Letters,No.12, Vol.25, pp. 1431 – 1437, 2004.
  10. Sayuthi Jaafar, Azizah A Manaf, Akram M Zeki, “Steganography Technique Using Modulus Arithmetic”, in 9th International Symposium on Signal Processing and Its Applications, pp. 1 – 4, 2007.10.1109/ISSPA.2007.4555443
  11. W. Bender, D. Gruhl, N. Morimoto, and A. Lu,” Techniques for Data Hiding”, I.B.M. Systems Journal, No.3.4,Vol.35, pp. 313-336, 1996.10.1147/sj.353.0313
  12. N. Nikolaidis, and I. Pitas, “Robust Image Watermarking in the Spatial Domain”, Signal Processing, No.3,Vol.66, pp. 385-403, 199810.1016/S0165-1684(98)00017-6
  13. T. Morkel, J. Eloff, and M. Olivier,”An Overview of Image Steganography”, In Proceedings of the Fifth Annual Information Security South Africa Conference ISSA, 2005.
  14. Currie, D.L. & Irvine, C.E., “Surmounting the Effects of Lossy Compression on Steganography”, in19th National Information Systems Security Conference, 1996
  15. D. Fu, Y. Shi, D. Zou, and G. Xuan. “JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain”, IEEE: 8th Workshop on Multimedia Signal Processing 2006, pp. 310313, 2006.
  16. Tao Zhang & Xijian Ping “A Fast and Effective Steganalytic Technique against JSteg-like Algorithms” SAC 2003.10.1145/952532.952595
  17. N. Provos. “Defending Against Statistical Steganalysis”, 10th USENIX Security Symposium, vol. 10, pp. 323-335, 2001
  18. Fridrich J., Goljan M., and Hogea D., “Attacking the OutGuess,” ,Proc.ACM Workshop Multimedia and Security, 2002.
  19. Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt “Digital image steganography: Survey and analysis of current methods” , Signal Processing, No.3,Vol.90, pp 727–752,2010.10.1016/j.sigpro.2009.08.010
  20. X. Li, J. Wang, “A Steganographic Method Based Upon JPEG and Particle Swarm Optimization Algorithm”, Information Sciences, No.15,Vol.177, pp. 3099–31091, 2007.
  21. S.C.Mukhopadhyay, F.P.Dawson, M.Iwahara and S.Yamada, “A Novel Compact Magnetic Current Limiter for Three Phase Applications”, IEEE Transactions on Magnetics, Vol. 36, No. 5, pp. 3568-3570, September 2000.
  22. Y.H. Yu, C.C. Chang, I.C. Lin,” A New Steganographic Method for Color and Grayscale Image Hiding”, Computer Vision and Image Under- standing, No.3,Vol.107, pp.183–194,2007.10.1016/j.cviu.2006.11.002
  23. S.C.Mukhopadhyay, S. Deb Choudhury, T. Allsop, V. Kasturi and G. E. Norris, “Assessment of pelt quality in leather making using a novel non-invasive sensing approach”, Journal of Biochemical and Biophysical methods, Elsevier, JBBM Vol. 70, pp. 809-815, 2008.10.1016/j.jbbm.2007.07.00317707083
  24. A.I. Hashad, A.S. Madani, A.E.M.A.” Wahdan, A Robust Steganography Technique Using Discrete Cosine Transform Insertion”, in IEEE/ITI Third International Conference on Information and Communications Technology, 2005, pp. 255–264.
  25. http;//www.cs.washington.eduresearchimagedatabasegroundtruth_tars.for.download
  26. http://vision.okstate.eduloc=csiq
  27. N.K. Suryadevara, S.C. Mukhopadhyay, R. Wang, R.K. Rayudu, Forecasting the behavior of an elderly using wireless sensors data in a smart home, Engineering Applications of Artificial Intelligence, Volume 26, Issue 10, November 2013, Pages 2641-2652, ISSN 0952-1976, http://dx.doi.org/10.1016/j.engappai.2013.08.004.10.1016/j.engappai.2013.08.004
  28. V.Nagaraj, Dr. V. Vijayalakshmi and Dr. G. Zayaraz” Color Image Steganography based on Pixel Value Modification Method Using Modulus Function” International Conference on Electronic Engineering and Computer Science, IERI Procedia 4, 2013, pp. 17 – 24.10.1016/j.ieri.2013.11.004
  29. Yanmin LUO, Peizhong LIU and Minghong LIAO, An artificial immune network clustering algorithm for mangroves remote sensing, International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO. 1, pp. 116 – 134, 2014.10.21307/ijssis-2017-648
  30. Daode Zhang et al., Research on chips’ defect extraction based on image-matching, International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO. 1, pp. 321 – 336, 2014.10.21307/ijssis-2017-658
Language: English
Page range: 90 - 106
Submitted on: Nov 3, 2014
Accepted on: Jan 5, 2015
Published on: Mar 1, 2015
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 times per year

© 2015 Hamdan Lateef Jaheel, Zou Beiji, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.