• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4640427)   Today's Articles (595)   Subscriber (50377)
For: Martín A, Sapiro G, Seroussi G. Is image steganography natural? IEEE Trans Image Process 2005;14:2040-50. [PMID: 16370457 DOI: 10.1109/tip.2005.859370] [Citation(s) in RCA: 10] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/05/2023]
Number Cited by Other Article(s)
1
Data Hiding and Integrity Verification based on Quotient Value Differencing and Merkle Tree. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING 2022. [DOI: 10.1007/s13369-022-06961-9] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
2
Sonar R, Swain G. A hybrid steganography technique based on RR, AQVD, and QVC. INFORMATION SECURITY JOURNAL: A GLOBAL PERSPECTIVE 2022. [DOI: 10.1080/19393555.2021.1912219] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
3
Sonar R, Swain G. Steganography based on quotient value differencing and pixel value correlation. CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY 2021. [DOI: 10.1049/cit2.12050] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]  Open
4
Very High Capacity Image Steganography Technique Using Quotient Value Differencing and LSB Substitution. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING 2018. [DOI: 10.1007/s13369-018-3372-2] [Citation(s) in RCA: 49] [Impact Index Per Article: 8.2] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
5
Jain M, Kumar A, Choudhary RC. Improved diagonal queue medical image steganography using Chaos theory, LFSR, and Rabin cryptosystem. Brain Inform 2016;4:95-106. [PMID: 27747825 PMCID: PMC5413591 DOI: 10.1007/s40708-016-0057-z] [Citation(s) in RCA: 15] [Impact Index Per Article: 1.9] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/04/2016] [Accepted: 08/29/2016] [Indexed: 11/30/2022]  Open
6
RGB channel based decision tree grey-alpha medical image steganography with RSA cryptosystem. INT J MACH LEARN CYB 2016. [DOI: 10.1007/s13042-016-0542-y] [Citation(s) in RCA: 12] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
7
Jain M, Lenka SK. Diagonal queue medical image steganography with Rabin cryptosystem. Brain Inform 2016;3:39-51. [PMID: 27747599 PMCID: PMC4883164 DOI: 10.1007/s40708-016-0032-8] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/21/2015] [Accepted: 01/08/2016] [Indexed: 11/29/2022]  Open
8
Gujrati character recognition using weighted k-NN and Mean χ 2 distance measure. INT J MACH LEARN CYB 2013. [DOI: 10.1007/s13042-013-0187-z] [Citation(s) in RCA: 14] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
9
Bian Y, Liang S. Locally optimal detection of image watermarks in the wavelet domain using Bessel K form distribution. IEEE TRANSACTIONS ON IMAGE PROCESSING : A PUBLICATION OF THE IEEE SIGNAL PROCESSING SOCIETY 2013;22:2372-2384. [PMID: 23412613 DOI: 10.1109/tip.2013.2246177] [Citation(s) in RCA: 8] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/01/2023]
10
Desoky A. Innocipher: A Novel Innocent-Cipher-Based Cryptography Paradigm—High Level of Security for Fooling the Enemy. INFORMATION SECURITY JOURNAL: A GLOBAL PERSPECTIVE 2013. [DOI: 10.1080/19393555.2013.774448] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/26/2022]
11
Desoky A. Notestega: Notes-based Steganography Methodology. INFORMATION SECURITY JOURNAL: A GLOBAL PERSPECTIVE 2009. [DOI: 10.1080/19393550903076841] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA