27
Views
3
CrossRef citations to date
0
Altmetric
Original Articles

Gabor Transform based Image Steganography

&
Pages 103-112 | Published online: 01 Sep 2014

References

  • Po-Chyi Su & C C Jay Kuo, (2003) Steganography in. JPEG2000 Compressed Images, IEEE Transactions on Consumer Electronics., vol 49, November 2003 Contributed Paper.
  • F A P Pelitcolas, R J Anderson, & M G Kuhn, Information Hiding - A Survey, IEEE Proceedings, vol 87, no 7, July 1999, 1062–1078.
  • R J Anderson & FAP Petitcolas, (May 1999), On the Limits of Steganography, IEEE Journal on Selected Areas in communications, vol 16, no 4, pp 474–481.
  • Xu Jianyun, Andrew H Sung, Peipei Shi & Qingzhong Liu, (2004), JPEG Compression Imune Steganography using Wavelet Transform, Proceedings of the International Conference on Information Technology, Coding and Computing (ITCC ’04) 0-7695-2108-8/04 IEEE.
  • O Dabeer, K Sullivan, U Madhow, S Chandrasckaran & B S Manjunath, Detection of hiding in the least significant bit, IEEE Transactions on Signal Processing, Supplement Secure Media I, vol 52, no 10, pp 3046–3058, 2004.
  • K Murali, H Yu, V Varadan & H Leung, Secure communication using a chaos based signal encryption scheme, IEEE Trans Consumer Electronics, vol 47, pp 709–714, 2001.
  • LM Marvel, C G B Jr, & C T Retter, Spread Spectrum Image Steganography, IEEE Transactions on Image Processing, vol 8, no 8, August 1999, pp 1075–1083.
  • S Lin & D J Costello Jr, Error Control Coding: Fundamental and Applications; Prentice-Hall, Englewood Cliffs, NJ 1983, vol 6, no 9, pp 35–39.
  • M Itoh, Spread spectrum communication via chaos, lut J Bifurcation & Chaos, vol 9, pp 155–213, 1996.
  • W Pennebaker & J Mitchell, JPEG Still Image Compression Standard, New York: Van Nostrand Reinhold, 1993, vol 8, pp 175–183.
  • Chang Chin-Chen, Chi-Lung Chiang & Ju-Yuan Hsiao, (March 2005), A DCT-domain system for Hiding Fractal Compressed Images. Advanced Information Networking and Applications-05,AINA 2005, 19th International Conference, vol 2, 25–30, pp 83–86.
  • Chin-Chen Chang, Yung-Chen Chou, Quantization Index Modulation Using Vector Quantization with DWT Based State-Codebook Search, International Conference on Intelligent Information Hiding and Multimedia, pp 549-554, 2006.
  • Chin-Chen Chang, Tung-Shou Chen & Hsien-Chu Hsia, An Effective Image Steganographic Scheme Based on Wavelet Transformation and Pattern-Based Modification, 0-7695-2033-2/03, IEEE 2003.
  • T S Chen, C C Chang & M S, Hwang, A Virtual Image Cryptosystem Based on Vector Quantization, IEEE Transactions on Image Processing, vol 7, no 10, 1997, pp 1485–1488.
  • N Provos & P Honeyman, Detecting Steganographic Content on the Internet, Proc ISOC NDSS, 2002, vol 11, no 2, pp 75–77.
  • A Westfeld & A Pfitzmann, Attacks on Steganographic Systems, IHWLNCS, 1768, pp 61–76, 1999.
  • A Westfeld, F5 - A Steganographic Algorithm, Information Hiding Workshop, LNCS 2137, pp 289–302, 2001.
  • Robert A Baxter, SAR Image Compression with the Gabor Transform, IEEE Transforms on Geoscience and Remote Sensing, Jan 1999, vol 11, no 12, pp 9–15.
  • Manjunath BS & Ma W Y (1996), Texture features for browsing and retrieval of image data, IEEE Transaction on pattern analysis and machine intelligence, vol 18, no 8, pp 837–842.
  • George R Cross & Anil K Jain (1983), Markov random field texture models, IEEE Transaction on pattern analysis and machine intelligence, vol PAMI-5, no 1, pp 25–37.
  • B S Manjunath & R Chellappa (1991), Unsupervised Texture segmentation using Markov Random Field Model, IEEE Pattern analysis and machine intelligence, vol 13, no 5, pp 478–482.
  • C Bouman & B Liu (1991), Multiple Resolution Segmentation of Textured Images, IEEE Trans on Pattern analysis and Machine Intelligence, vol 13, pp 99–113.
  • Chaudhuri B B & Nirupam Sarkar (1983), Texture segmentation using fractal dimension, IEEE Transaction on Pattern Analysis and Machine Intelligence, vol 17, no 1.pp 72–77.
  • Dimitrios charalampidis (2002), Wavelet based Rotational invariant Roughness features for texture classification and segmentation, IEEE Transaction on Image Processing, vol 11, no 8; pp 825–837.
  • A Srivastava, X Liu, & U V Grenander, Universal analytical forms for modeling image probabilities, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol 24, pp 1200–1214, Sept 2002.
  • Coddington, P D Newel & A J Parallel, JAPARA - a Java parallel random number generator library for high performance computing, Distributed Processing Symposium, 2004, Proceedings of 18th International, pp 26–30 April 2004.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.