Image steganography for authenticity of visual contents in social networks
Published 2017 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Image steganography for authenticity of visual contents in social networks
Authors
Keywords
Information security, Authenticity of visual contents, Steganography, Multimedia security, Crystography
Journal
MULTIMEDIA TOOLS AND APPLICATIONS
Volume 76, Issue 18, Pages 18985-19004
Publisher
Springer Nature
Online
2017-02-22
DOI
10.1007/s11042-017-4420-8
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Image steganography using uncorrelated color space and its application for security of visual contents in online social networks
- (2018) Khan Muhammad et al. Future Generation Computer Systems-The International Journal of eScience
- Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy
- (2016) Khan Muhammad et al. JOURNAL OF MEDICAL SYSTEMS
- CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method
- (2016) Khan Muhammad et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Compressed and raw video steganography techniques: a comprehensive survey and analysis
- (2016) Ramadhan J. Mstafa et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Authentication and recovery algorithm for speech signal based on digital watermarking
- (2016) Zhenghui Liu et al. SIGNAL PROCESSING
- Visual saliency models for summarization of diagnostic hysteroscopy videos in healthcare systems
- (2016) Khan Muhammad et al. SpringerPlus
- Healthcare algorithms by wearable inertial sensors: a survey
- (2015) Ao Buke et al. China Communications
- A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image
- (2015) Khan Muhammad et al. MULTIMEDIA TOOLS AND APPLICATIONS
- A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes
- (2015) Ramadhan J. Mstafa et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Privacy and Security for Multimedia Content shared on OSNs: Issues and Countermeasures
- (2014) C. Patsakis et al. COMPUTER JOURNAL
- A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm
- (2014) Hamidreza Rashidy Kanan et al. EXPERT SYSTEMS WITH APPLICATIONS
- A new steganography method which preserves histogram: Generalization of LSB++
- (2014) Kazem Qazanfari et al. INFORMATION SCIENCES
- A high capacity image steganography using multi-layer embedding
- (2014) Mingwei Tang et al. OPTIK
- Mobile-Cloud Assisted Video Summarization Framework for Efficient Management of Remote Sensing Data Generated by Wireless Capsule Sensors
- (2014) Irfan Mehmood et al. SENSORS
- A novel technique for image steganography based on a high payload method and edge detection
- (2012) Anastasia Ioannidou et al. EXPERT SYSTEMS WITH APPLICATIONS
- Genetic programming-based perceptual shaping of a digital watermark in the wavelet domain using Morton scanning
- (2011) Zahoor Jan et al. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS
- Edge Adaptive Image Steganography Based on LSB Matching Revisited
- (2010) Weiqi Luo et al. IEEE Transactions on Information Forensics and Security
- High payload steganography mechanism using hybrid edge detector
- (2009) Wen-Jan Chen et al. EXPERT SYSTEMS WITH APPLICATIONS
- Digital image steganography: Survey and analysis of current methods
- (2009) Abbas Cheddad et al. SIGNAL PROCESSING
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started