Secret image sharing in steganography
Secret image sharing based on cellular automata and steganography FREE-DOWNLOAD Z Eslami, SH Razzaghi… – Pattern Recognition, 2010 Recently Lin and Tsai [Secret image sharing with steganography and authentication, The Journal of Systems and Software 73 (2004) 405–414] and Yang et al. [Improvements of image sharing with steganography and authentication,
JPEG steganography-02
JPEG steganography: a performance evaluation of quantization tables FREE-DOWNLOAD A Almohammad, G Ghinea… – … Conference on Advanced …, 2009 The two most important aspects of any image- based steganographic system are the imperceptibility and the capacity of the stego image. This paper evaluates the performance and efficiency of using optimized quantization tables instead of default […]
black box steganography
Upper and lower bounds on black-box steganography FREE-DOWNLOAD N Dedic, G Itkis, L Reyzin… – Journal of cryptology, 2009 Abstract. We study the limitations of steganography when the sender is not using any properties of the underlying channel beyond its entropy and the ability to sample from it. On the negative side, we show that the number […]