20
Views
3
CrossRef citations to date
0
Altmetric
Articles

Secure data hiding scheme using firefly algorithm with hidden compression

&

References

  • S. Hemalatha, U. Acharya and A. Renuka, “Comparison of Secure and High Capacity Color Image Steganography Techniques in RGB and YCBCR domains”, International Journal of Advanced Information Technology(2013), Vol.3, No.3, pp.1-9.
  • A. Amsaveni and C. Arunkumar, “An Efficient Data Hiding Scheme Using Firefly Algorithm In Spatial Domain”, IEEE sponsored 2nd international conference on electronics and communication system(2015), pp.650-655.
  • D. Gaikwad and S. Wagh, “Colour Image Restoration For An Effective Steganography”, I-mar”s Journal on Software Engineering (2010), Vol.4, No.3, pp.65-71.
  • H. Zhang, X. Ping, M. Xu, R. Wang, “Steganalysis by subtractive pixel adjacency matrix and dimensionality reduction”, Science China Information Sciences (2014),pp.1-7.
  • K Muhammad, J. Ahmad, S. Rho, S.W. Baik, “Image steganography for authenticity of visual contents in social networks”, Multimedia Tools and Applications (2017) pp.1-20
  • M. Juneja and P. Sandhu, “A New Approach for Information security using an Improved Steganography Technique”, Journal of Info. Pro.Systems (2013), Vol 9, No:3, pp.405-424.
  • W. Chen, Y. Liao, Y. Lin, C. Wang, “A novel general multiple-base data embedding algorithm”, Information Sciences (2016), pp.164-190.
  • S. Laskar and K. Hemachandran, “Steganography Based On Random Pixel Selection For Efficient Data Hiding”, International Journal of Computer Engineering and Technology (2013), Vol.4, Issue 2, pp.31-44
  • Malik, Aruna, Geeta Sikka, and Harsh K. Verma. “A high capacity text steganography scheme based on huffman compression and color coding.” Journal of Information and Optimization Sciences 38.5 (2017): 647-664.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.