Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding: A survey,†Proc. IEEE (SpecialIssue on Identification and Protection of Multimedia Information), vol. 87, pp. 1062-1078, July 1999. [2] I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking. San Francisco, CA: Morgan-Kaufmann, 2002. [3] F. Hartung and M. Kutter, “Multimedia watermarking techniques,†Proc. IEEE (Special Issue on Identification and Protection of Multimedia Information), vol. 87, pp. 1079-1107, July 1999. [4] G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, “Watermarking digital image and video data: A stateof-the-art overview,†IEEE Signal Processing Magazine, vol. 17, pp. 20-46, Sept. 2000. [5] N. F. Johnson and S. Katzenbeisser, “A survey of steganographic techniques,†in Information Hiding, S. Katzenbeisser and F. Petitcolas Eds. Norwood, MA: Artech House, 2000, pp. 43-78. [6] S. Wang and H. Wang, “Cyber warfare: Steganography vs. steganalysis,†Communications of the ACM, vol. 47, pp. 76-82, Oct. 2004. [7] C. Cachin, “An information-theoretic model for steganography,†in Proc. 2nd Intern. Workshop on Information Hiding, Portland, OR, Apr. 1998, pp. 306- 318. [8] G. J. Simmons, “The prisoner’s problem and the subliminal channel,†in Advances in Cryptology: Proc. CRYPTO’83. New York, NY: Plenum, 1984, pp. 51-67. [9] J. Fridrich, Steganography in Digital Media, Principles, Algorithms, and Applications. Combridge, UK: Combridge Univeristy Press, 2010. [10] Y. Wang and P. Moulin, “Perfectly secure steganography: Capacity, error exponents, and code constructions,†IEEE Trans. Inform. Theory, vol. 54, pp. 2706-2722, June 2008. [11] Federal plan for cyber security and information assurance research and development, Interagency Working Group on Cyber Security and Information Assurance, Apr. 2006. [12] R. Chandramouli, “A mathematical framework for active steganalysis,†ACM Multimedia Systems Special Issue on Multimedia Watermarking, vol. 9, pp. 303-311, Sept. 2003. [13] H. S. Malvar and D. A. Florencio, “Improved spread spectrum: A new modulation technique for robust watermarking,†IEEE Trans. Signal Proc., vol. 51, pp. 898-905, Apr. 2003. [14] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shannon, “Secure spread spectrum watermarking for multimedia,†IEEE Trans. Image Proc., vol. 6, pp. 1673- 1687, Dec. 1997. [15] J. Hernandez, M. Amado, and F. Perez-Gonzalez, “DCT-domain water- marking techniques for still images: Detector performance analysis and a new structure,†IEEE Trans. Image Proc., vol. 9, pp. 55-68, Jan. 2000. [16] C. Qiang and T. S. Huang, “An additive approach to transform-domain information hiding and optimum detection structure,†IEEE Trans. Multimedia, vol. 3, pp. 273-284, Sept. 2001. [17] C. Fei, D. Kundur, and R. H. Kwong, “Analysis and design of wa- termarking algorithms for improved resistance to compression,†IEEE Trans. Image Proc., vol. 13, pp. 126-144, Feb. 2004. [18] M. Gkizeli, D. A. Pados, and M. J. Medley, “SINR, bit error rate, and Shannon capacity optimized spreadspectrum steganography,†in Proc. IEEE Intern. Conf. Image Proce. (ICIP), Singapore, Oct. 2004, pp. 1561- 1564. [19] M. Gkizeli, D. A. Pados, S. N. Batalama, and M. J. Medley, “Blind iterative recovery of spread-spectrum steganographic messages,†in Proc. IEEE Intern. Conf. Image Proc. (ICIP), Genova, Italy, Sept. 2005, vol. 2, pp. 11-14. [20] M. Gkizeli, D. A. Pados, and M. J. Medley, “Optimal signature design for spread-spectrum steganography,†IEEE Trans. Image Proc., vol. 16, pp. 391-405, Feb. 2007.
![]() | V1I69.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|