A Steganography Technique Based on the Huffman Codes and PM1 Technique
Abstract
Keywords
Full Text:
PDFReferences
Holotyak, T., Fridrich, J. and Soukal, D., 2005, March. Stochastic approach to secret message length estimation in±k embedding steganography. In Electronic Imaging 2005 (pp. 673-684). International Society for Optics and Photonics.
Mielikainen, J., 2006. LSB matching revisited. IEEE signal processing letters, 13(5), pp.285-287.
Zhang, L., Wang, H. and Wu, R., 2009. A high-capacity steganography scheme for JPEG2000 baseline system. IEEE Transactions on Image Processing, 18(8), pp.1797-1803.
Yu, L., Zhao, Y., Ni, R. and Zhu, Z., 2009. PM1 steganography in JPEG images using genetic algorithm. Soft Computing, 13(4), pp.393-400.
Chan, C.K. and Cheng, L.M., 2004. Hiding data in images by simple LSB substitution. Pattern recognition, 37(3), pp.469-474.
Wang, R.Z., Lin, C.F. and Lin, J.C., 2001. Image hiding by optimal LSB substitution and genetic algorithm. Pattern recognition, 34(3), pp.671-683.
Wang, R.Z., Lin, C.F. and Lin, J.C., 2001. Image hiding by optimal LSB substitution and genetic algorithm. Pattern recognition, 34(3), pp.671-683.
Wang, S., Yang, B. and Niu, X., 2010. A secure steganography method based on genetic algorithm. Journal of Information Hiding and Multimedia Signal Processing, 1(1), pp.28-35.
Tiwari, P., Madaan, N. and Nafis, M.T., 2015. Cryptographic Technique: Base Change Method. International Journal of Computer Applications, 118(14).
Tiwari, P. and Nafis, M.T., 2015. Error Patterns and Analysis of Hindi Shallow Parser. International Journal of Computer Applications, 110(14).
Dwivedi, S. (2016). An optimized steganographic technique. CSI Transactions on ICT, 1-9. doi: 10.1007/s40012-016-0116-x
DOI: https://doi.org/10.26483/ijarcs.v8i5.3542
Refbacks
- There are currently no refbacks.
Copyright (c) 2017 International Journal of Advanced Research in Computer Science

