Compression‐based steganography
暂无分享,去创建一个
Alfredo De Santis | Bruno Carpentieri | Francesco Palmieri | Raffaele Pizzolante | Arcangelo Castiglione | A. D. Santis | Arcangelo Castiglione | F. Palmieri | Raffaele Pizzolante | B. Carpentieri
[1] Roman V. Yampolskiy,et al. Steganography and Visual Cryptography in Computer Forensics , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[2] Alfredo De Santis,et al. An asynchronous covert channel using spam , 2012, Comput. Math. Appl..
[3] Alfredo De Santis,et al. On-Board Format-Independent Security of Functional Magnetic Resonance Images , 2017, ACM Trans. Embed. Comput. Syst..
[4] Ilsun You,et al. A Secure Distributed Video Surveillance System Based on Portable Devices , 2012, CD-ARES.
[5] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[6] Friedrich L. Bauer. Decrypted secrets - methods and maxims of cryptology , 1997 .
[7] Alfredo De Santis,et al. One-pass lossless data hiding and compression of remote sensing data , 2019, Future Gener. Comput. Syst..
[8] Alfredo De Santis,et al. On the Protection of fMRI Images in Multi-domain Environments , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications.
[9] Jeff Gilchrist Elytra. PARALLEL DATA COMPRESSION WITH BZIP 2 , 2003 .
[10] Pejman Khadivi,et al. Hardware implementation of a novel adaptive version of Deflate compression algorithm , 2010, 2010 18th Iranian Conference on Electrical Engineering.
[11] Bruno Carpentieri,et al. The AVQ Algorithm: Watermarking and Compression Performances , 2011, 2011 Third International Conference on Intelligent Networking and Collaborative Systems.
[12] Nagarajan Ranganathan,et al. High-speed VLSI designs for Lempel-Ziv-based data compression , 1993 .
[13] Ilsun You,et al. Secure and distributed video surveillance via portable devices , 2014, J. Ambient Intell. Humaniz. Comput..
[14] Alfredo De Santis,et al. On the protection of consumer genomic data in the Internet of Living Things , 2017, Comput. Secur..
[15] Marek R. Ogiela,et al. Key Generation for Multi-Secret Steganography , 2015, 2015 2nd International Conference on Information Science and Security (ICISS).
[16] Alfredo De Santis,et al. Protection of Microscopy Images through Digital Watermarking Techniques , 2014, 2014 International Conference on Intelligent Networking and Collaborative Systems.
[17] Dmitry A. Shkarin,et al. PPM: one step to practicality , 2002, Proceedings DCC 2002. Data Compression Conference.
[18] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[19] Alfredo De Santis,et al. Format-Independent Protection of DNA Microarray Images , 2015, 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).
[20] Marek R. Ogiela,et al. False and multi-secret steganography in digital images , 2015, Soft Comput..
[21] Stefan Katzenbeisser,et al. Defining security in steganographic systems , 2002, IS&T/SPIE Electronic Imaging.
[22] Bruno Carpentieri,et al. Copyright Protection for Digital Images on Portable Devices , 2016, Comput. Informatics.
[23] Francesco Palmieri,et al. Automatic security assessment for next generation wireless mobile networks , 2011, Mob. Inf. Syst..
[24] Marek R. Ogiela,et al. Fuzzy Vault Schemes in Multi-secret Digital Steganography , 2015, 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA).
[25] J. van Leeuwen,et al. Information Hiding , 1999, Lecture Notes in Computer Science.
[26] Alfredo De Santis,et al. Reversible Copyright Protection for DNA Microarray Images , 2015, 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).
[27] Bruno Carpentieri,et al. A Secure Low Complexity Approach for Compression and Transmission of 3-D Medical Images , 2013, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications.
[28] Bruno Carpentieri,et al. Copyright Protection for Images on Mobile Devices , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[29] Alfredo De Santis,et al. E-mail-Based Covert Channels for Asynchronous Message Steganography , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.