162 related articles for article (PubMed ID: 31137215)
1. Steganography in beautified images.
Liu LY; Wang ZC; Qian ZX; Zhang XP; Feng GR
Math Biosci Eng; 2019 Mar; 16(4):2322-2333. PubMed ID: 31137215
[TBL] [Abstract][Full Text] [Related]
2. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.
Al-Dmour H; Al-Ani A
Comput Methods Programs Biomed; 2016 Apr; 127():24-43. PubMed ID: 27000287
[TBL] [Abstract][Full Text] [Related]
3. ASSAF: Advanced and Slim StegAnalysis Detection Framework for JPEG images based on deep convolutional denoising autoencoder and Siamese networks.
Cohen A; Cohen A; Nissim N
Neural Netw; 2020 Nov; 131():64-77. PubMed ID: 32759032
[TBL] [Abstract][Full Text] [Related]
4. Is image steganography natural?
Martín A; Sapiro G; Seroussi G
IEEE Trans Image Process; 2005 Dec; 14(12):2040-50. PubMed ID: 16370457
[TBL] [Abstract][Full Text] [Related]
5. JPEG Steganography With Content Similarity Evaluation.
Wang Z; Feng G; Qian Z; Zhang X
IEEE Trans Cybern; 2023 Aug; 53(8):5082-5093. PubMed ID: 35580096
[TBL] [Abstract][Full Text] [Related]
6. High capacity reversible data hiding in MP3 based on Huffman table transformation.
Tan DW; Lu YL; Yan XH; Liu LT; Li LL
Math Biosci Eng; 2019 Apr; 16(4):3183-3194. PubMed ID: 31137257
[TBL] [Abstract][Full Text] [Related]
7. A Robust Quasi-Quantum Walks-Based Steganography Protocol for Secure Transmission of Images on Cloud-Based E-healthcare Platforms.
Abd-El-Atty B; Iliyasu AM; Alaskar H; Abd El-Latif AA
Sensors (Basel); 2020 May; 20(11):. PubMed ID: 32486383
[TBL] [Abstract][Full Text] [Related]
8. Genetic algorithm based methodology for breaking the steganalytic systems.
Wu YT; Shih FY
IEEE Trans Syst Man Cybern B Cybern; 2006 Feb; 36(1):24-31. PubMed ID: 16468564
[TBL] [Abstract][Full Text] [Related]
9. SABMIS: sparse approximation based blind multi-image steganography scheme.
Agrawal R; Ahuja K; Steinbach MC; Wick T
PeerJ Comput Sci; 2022; 8():e1080. PubMed ID: 36532802
[TBL] [Abstract][Full Text] [Related]
10. Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion.
Zhang Y; Zhu J; Xue M; Zhang X; Cao X
IEEE Trans Vis Comput Graph; 2024 Aug; 30(8):5299-5312. PubMed ID: 37363849
[TBL] [Abstract][Full Text] [Related]
11. Optimal signature design for spread-spectrum steganography.
Gkizeli M; Pados DA; Medley MJ
IEEE Trans Image Process; 2007 Feb; 16(2):391-405. PubMed ID: 17269633
[TBL] [Abstract][Full Text] [Related]
12. A novel fuzzy logic-based image steganography method to ensure medical data security.
Karakış R; Güler I; Çapraz I; Bilir E
Comput Biol Med; 2015 Dec; 67():172-83. PubMed ID: 26555746
[TBL] [Abstract][Full Text] [Related]
13. Comparative performance assessment of deep learning based image steganography techniques.
Himthani V; Dhaka VS; Kaur M; Rani G; Oza M; Lee HN
Sci Rep; 2022 Oct; 12(1):16895. PubMed ID: 36207314
[TBL] [Abstract][Full Text] [Related]
14. A High-Capacity Steganography Algorithm Based on Adaptive Frequency Channel Attention Networks.
Zhang S; Li H; Li L; Lu J; Zuo Z
Sensors (Basel); 2022 Oct; 22(20):. PubMed ID: 36298196
[TBL] [Abstract][Full Text] [Related]
15. Sensitive Patient Data Hiding using a ROI Reversible Steganography Scheme for DICOM Images.
Mantos PL; Maglogiannis I
J Med Syst; 2016 Jun; 40(6):156. PubMed ID: 27167526
[TBL] [Abstract][Full Text] [Related]
16. Lossless generalized-lSB data embedding.
Celik MU; Sharma G; Tekalp AM; Saber E
IEEE Trans Image Process; 2005 Feb; 14(2):253-66. PubMed ID: 15700530
[TBL] [Abstract][Full Text] [Related]
17. A high-capacity coverless image steganography method based on double-level index and block matching.
Chen XY; Qiu AQ; Sun XM; Wang S; Wei G
Math Biosci Eng; 2019 May; 16(5):4708-4722. PubMed ID: 31499685
[TBL] [Abstract][Full Text] [Related]
18. Double layer security using crypto-stego techniques: a comprehensive review.
Jan A; Parah SA; Hussan M; Malik BA
Health Technol (Berl); 2022; 12(1):9-31. PubMed ID: 34660167
[TBL] [Abstract][Full Text] [Related]
19. Steganography using reversible texture synthesis.
Wu KC; Wang CM
IEEE Trans Image Process; 2015 Jan; 24(1):130-9. PubMed ID: 25415988
[TBL] [Abstract][Full Text] [Related]
20. On Max-Plus Algebra and Its Application on Image Steganography.
Santoso KA; Fatmawati ; Suprajitno H
ScientificWorldJournal; 2018; 2018():6718653. PubMed ID: 29887761
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]