International Journal of Intelligence Science

International Journal of Intelligence Science

ISSN Print: 2163-0283
ISSN Online: 2163-0356
www.scirp.org/journal/ijis
E-mail: ijis@scirp.org
"Research on Embedding Capacity and Efficiency of Information Hiding Based on Digital Images"
written by Yanping Zhang, Juan Jiang, Yongliang Zha, Heng Zhang, Shu Zhao,
published by International Journal of Intelligence Science, Vol.3 No.2, 2013
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] CSIS: compressed sensing-based enhanced-embedding capacity image steganography scheme
2021
[2] CSIS: Compressed sensing‐based enhanced‐embedding capacity image steganography scheme
IET Image Processing, 2021
[3] SABMIS: Sparse approximation based blind multi-image steganography scheme
arXiv preprint arXiv …, 2021
[4] A Two-domain Data Hiding Scheme for Data Signature in Integrated Online Services Applications
Journal of Physics …, 2021
[5] Sécurité des images par tatouage numérique et cryptographie dans les applications médicales
2021
[6] Hiding Information Along Fractal in a Digital Cover to Improve Capacity
2020
[7] Improving data hiding capacity in code based steganography using multiple embedding
2020
[8] Modulus Calculations on Prime Number Algorithm for Information Hiding With High Comprehensive Performance
2020
[9] QUANTUM AUDIO STEGANOGRAPHY SYSTEM
2020
[10] SABMIS: -minimization and sparse approximation based blind multi-image steganography scheme
2020
[11] 基于多重光栅解码的半色调图像隐藏信息的三维显示方法研究
光学技术, 2020
[12] DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
2019
[13] A New Digital Image Steganography Approach Based on The Galois Field GF (pm) Using Graph and Automata
2019
[14] Generalizing Hamming+k data hiding by overlapped pixels
2019
[15] Optimal steganography with blind detection based on Bayesian optimization algorithm
2019
[16] Computer and Information Sciences
2019
[17] 基于边界调整的潜像隐蔽性优化方法
2019
[18] Image steganography using exploiting modification direction for compressed encrypted data
2019
[19] Partial-duplicate image retrieval based on HSV colour space for coverless information hiding
2019
[20] 基于汉明码和 Logistic-正弦映射的图像隐写
2018
[21] Approches de tatouage pour l'authentification de l'image dans des applications à contraintes temporelles
2018
[22] Analytical Review on Graphical Formats Used in Image Steganographic Compression
2018
[23] Improving capacity of Hamming (n, k)+ 1 stego-code by using optimized Hamming+ k
Digital Signal Processing, 2018
[24] 基于汉明码和 Logistic-正弦映射的图像隐写 Image Steganography Based on Hamming Code and Logistic-sine Encryption
2018
[25] Watermarking approaches for images authentication in applications with time constraints
2018
[26] A blind spatial domain-based image watermarking using texture analysis and association rules mining
2018
[27] A FUZZY LOGIC BASED BIT PLANE COMPLEXITY SEGMENTATION STEGANOGRAPHY TO SECURE ELECTRONIC HEALTH RECORDS
International Journal of Pure and Applied Mathematics, 2018
[28] Building a dataset for image steganography
2017
[29] Steganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images
2017
[30] A Secured Lsb Image Steganography System Using Edge Detection, Low Compression And Hybrid Encryption Methods
International Journal Of Advanced Technology In Engineering And Science, 2016
[31] Image Steganography Based on Hamming Code and Edge Detection
2016
[32] Methods To Enhance The Security And Embedding Capacity Of Steganography
IJRCCT, 2016
[33] An Enhanced N-Pattern Hybrid Technique for Medical Images in Telemedicine
Procedia Computer Science, 2016
[34] A SECURED LSB IMAGE STEGANOGRAPHY SYSTEM USING EDGE DETECTION, LZW COMPRESSION AND HYBRID ENCRYPTION METHODS
2016
[35] Methods To Enhance The Secur Stegano
International Journal of Research in Computing and Communication and Technology, 2016
[36] Sayısal görüntülerde blok ve tarama sırası temelli yeni bir veri gizleme algoritması tasarımı
2016
[37] استگانوگرافی کور مبتنی بر کدهای Reed-Solomon و جدول جانشانی بهینه با بهبود بار مفید جاسازی و مقاومت‎
2014
[38] A Blind Steganography based on Reed-Solomon Codes and Optimal Substitution Table with Improving Payload and Robustness
2014
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top