全部文献期刊学位论文会议报纸专利标准年鉴图书|学者科研项目
中外文文献  中文文献  外文文献
作者:G V Chaitanya , D Vamsee Krishna , L Anjaneyulu
来源:[J].International Journal of Image, Graphics and Signal Processing(IJIGSP), 2013, Vol.5 (4), pp.60-70MECS
摘要:... An adaptive and matched bit replacement method is used based on the sensitivity of Human Visual System (HVS) at different intensities. The proposed algorithm ensures that the generated stego image has a PSNR greater than 38.5 and is also resistant to visual attack. A three le...
作者:Rong-Jian Chen , Shi-Jinn Horng , Po-Hsian Huang
来源:[J].Int. J. of Ad Hoc and Ubiquitous Computing(IF 0.511), 2015, Vol.18 (1/2), pp.54-66Inderscience 出版公司
摘要:... Finally, antiforensics of the proposed steganography systems are demonstrated using the visual attack and the statistical attack of Chi-square analysis.
作者:Sunil K Moon1 Rajeshree D Raut2
来源:[J].ICTACT JOURNAL OF COMMUNICATION TECHNOLOGY, 2018, Vol.8 (4)ICT Academy of Tamil Nadu
摘要:... Moreover, the proposed scheme provides a large hiding capacity, more security for secret data and good visual recovery of both secret data and original video than any other existing methods. Through many attack during transmission on stego video, it is found that the suggeste...
作者:Anirban Goswami , Nabin Ghoshal
来源:[J].Int. J. of Information and Communication Technology, 2017, Vol.11 (2), pp.166-186Inderscience 出版公司
摘要:... In this paper, we propose a model for image authentication with robustness against certain attacks. To achieve this, we have effectively utilised two distinct colour cover images simultaneously and applied discrete cosine transform to convert them from spatial to frequency...
作者:Sunil K Moon1 Rajeshree D Raut2
来源:[J].ICTACT JOURNAL OF COMMUNICATION TECHNOLOGY, 2017, Vol.8 (4)ICT Academy of Tamil Nadu
摘要:... Moreover, the proposed scheme provides a large hiding capacity, more security for secret data and good visual recovery of both secret data and original video than any other existing methods. Through many attack during transmission on stego video, it is found that the suggeste...
作者:Wen-Chung Kuo , Sheng-Yi Chang , Chun-Cheng Wang ...
来源:[J].Multimedia Tools and Applications(IF 1.014), 2017, Vol.76 (2), pp.1901-1919Springer
摘要:... Experimental results show that our method enhances embedding capacity and maintains good visual stego image quality. In terms of security, the proposed scheme is more secure than LSB replacement method in terms of resisting visual attack and RS testing.

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×