ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Robust Steganography based on Matching Pixel Locations
International Journal of Computer Applications
◽
10.5120/ijca2017914252
◽
2017
◽
Vol 168
(12)
◽
pp. 3-10
Author(s):
Aminou Halidou
◽
Youssoufa Mohamadou
◽
Georges Delort
Keyword(s):
Robust Steganography
Download Full-text
Related Documents
Cited By
References
Generic attack against robust steganography based on spring transform and geometrization
Security and Communication Networks
◽
10.1002/sec.1583
◽
2016
◽
Vol 9
(16)
◽
pp. 3880-3892
◽
Cited By ~ 1
Author(s):
Qilin Qi
◽
Aaron Sharp
◽
Dongming Peng
◽
Yaoqing Yang
◽
Hamid Sharif
Keyword(s):
Generic Attack
◽
Robust Steganography
Download Full-text
A Robust Steganography Algorithm Based on Curvelet Transform
Electrical Engineering (ICEE), Iranian Conference on
◽
10.1109/icee.2018.8472443
◽
2018
◽
Author(s):
Hadi Gharavi
◽
Boshra Rajaei
Keyword(s):
Curvelet Transform
◽
Robust Steganography
Download Full-text
A robust steganography-based software watermarking
Proceedings of the 2012 ACM Research in Applied Computation Symposium on - RACS '12
◽
10.1145/2401603.2401675
◽
2012
◽
Cited By ~ 1
Author(s):
Cheol Jeon
◽
Yookun Cho
Keyword(s):
Software Watermarking
◽
Robust Steganography
Download Full-text
Biometric feature embedding using robust steganography technique
10.1117/12.2018910
◽
2013
◽
Cited By ~ 3
Author(s):
Rasber D. Rashid
◽
Harin Sellahewa
◽
Sabah A. Jassim
Keyword(s):
Robust Steganography
◽
Biometric Feature
Download Full-text
A novel joint secret image sharing and robust steganography method using wavelet
Multimedia Systems
◽
10.1007/s00530-013-0341-1
◽
2013
◽
Vol 20
(2)
◽
pp. 215-226
◽
Cited By ~ 11
Author(s):
Mohammad Javad Khosravi
◽
Ahmad Reza Naghsh-Nilchi
Keyword(s):
Secret Image Sharing
◽
Secret Image
◽
Image Sharing
◽
Robust Steganography
Download Full-text
A Robust Steganography method Using Adjustable Parameters
International Journal of Electrical and Computer Engineering (IJECE)
◽
10.11591/ijece.v3i2.2236
◽
2013
◽
Vol 3
(2)
◽
Author(s):
Ahmad Reza Eskandari
Keyword(s):
Robust Steganography
Download Full-text
A Robust Steganography Structure Using a Nested Linear Code
Lecture Notes in Electrical Engineering - Proceedings of the 2nd International Conference on Intelligent Technologies and Engineering Systems (ICITES2013)
◽
10.1007/978-3-319-04573-3_136
◽
2014
◽
pp. 1119-1124
Author(s):
Jyun-Jie Wang
◽
Chi-Yuan Lin
Keyword(s):
Linear Code
◽
Robust Steganography
Download Full-text
A robust steganography algorithm based on texture similarity using gabor filter
Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.
◽
10.1109/isspit.2005.1577161
◽
2006
◽
Cited By ~ 7
Author(s):
Z.Z. Kermani
◽
M. Jamzad
Keyword(s):
Gabor Filter
◽
Robust Steganography
Download Full-text
A robust steganography method for HEVC based on secret sharing
Cognitive Systems Research
◽
10.1016/j.cogsys.2019.09.008
◽
2020
◽
Vol 59
◽
pp. 207-220
Author(s):
Shuyang Liu
◽
Degang Xu
Keyword(s):
Secret Sharing
◽
Robust Steganography
Download Full-text
Dual Transform Technique for Robust Steganography
2011 International Conference on Computational Intelligence and Communication Networks
◽
10.1109/cicn.2011.65
◽
2011
◽
Cited By ~ 4
Author(s):
K.B. Shiva Kumar
◽
T. Khasim
◽
K.B. Raja
◽
Sabyasachi Pattnaik
◽
R.K. Chhotaray
Keyword(s):
Robust Steganography
◽
Dual Transform
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close