default search action
Search dblp for Publications
export results for "stego image quality"
@inproceedings{DBLP:conf/ictas/JahbelAN24, author = {Abdulati K. S. Jahbel and Tohari Ahmad and Jean De La Croix Ntivuguruzwa}, title = {Reduced Difference Expansion based on Cover Image Bisection for a Quality Stego Image}, booktitle = {Conference on Information Communications Technology and Society, {ICTAS} 2024, Durban, South Africa, March 7-8, 2024}, pages = {51--56}, year = {2024}, crossref = {DBLP:conf/ictas/2024}, url = {https://doi.org/10.1109/ICTAS59620.2024.10507134}, doi = {10.1109/ICTAS59620.2024.10507134}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictas/JahbelAN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictas/ZainiNA24, author = {Alfa Fakhrur Rizal Zaini and Jean De La Croix Ntivuguruzwa and Tohari Ahmad}, title = {A Steganographic Approach Based on Pixel Blocks Differencing to Enhance the Quality of the Stego Image}, booktitle = {Conference on Information Communications Technology and Society, {ICTAS} 2024, Durban, South Africa, March 7-8, 2024}, pages = {63--68}, year = {2024}, crossref = {DBLP:conf/ictas/2024}, url = {https://doi.org/10.1109/ICTAS59620.2024.10507107}, doi = {10.1109/ICTAS59620.2024.10507107}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictas/ZainiNA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcse/HorngXC20, author = {Ji{-}Hwei Horng and Xiao{-}Zhu Xie and Chin{-}Chen Chang}, title = {The analysis of stego image visual quality for a data hiding scheme based on two-layer turtle shell matrix}, journal = {Int. J. Comput. Sci. Eng.}, volume = {23}, number = {4}, pages = {336--340}, year = {2020}, url = {https://doi.org/10.1504/IJCSE.2020.113178}, doi = {10.1504/IJCSE.2020.113178}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcse/HorngXC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/YangWCK19, author = {Ching{-}Nung Yang and Song{-}Yu Wu and Yung{-}Shun Chou and Cheonshik Kim}, title = {Enhanced stego-image quality and embedding capacity for the partial reversible data hiding scheme}, journal = {Multim. Tools Appl.}, volume = {78}, number = {13}, pages = {18595--18616}, year = {2019}, url = {https://doi.org/10.1007/s11042-019-7220-5}, doi = {10.1007/S11042-019-7220-5}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/YangWCK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/YangHK17, author = {Ching{-}Nung Yang and Shen{-}Chieh Hsu and Cheonshik Kim}, title = {Improving stego image quality in image interpolation based data hiding}, journal = {Comput. Stand. Interfaces}, volume = {50}, pages = {209--215}, year = {2017}, url = {https://doi.org/10.1016/j.csi.2016.10.005}, doi = {10.1016/J.CSI.2016.10.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/YangHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KamalI17, author = {A. H. M. Kamal and Mohammad Mahfuzul Islam}, title = {Enhancing embedding capacity and stego image quality by employing multi predictors}, journal = {J. Inf. Secur. Appl.}, volume = {32}, pages = {59--74}, year = {2017}, url = {https://doi.org/10.1016/j.jisa.2016.08.005}, doi = {10.1016/J.JISA.2016.08.005}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KamalI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ChangHL17, author = {Chin{-}Chen Chang and Ying{-}Hsuan Huang and Tzu{-}Chuen Lu}, title = {A difference expansion based reversible information hiding scheme with high stego image visual quality}, journal = {Multim. Tools Appl.}, volume = {76}, number = {10}, pages = {12659--12681}, year = {2017}, url = {https://doi.org/10.1007/s11042-016-3689-3}, doi = {10.1007/S11042-016-3689-3}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ChangHL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/HeLT17, author = {Junhui He and Weiqiang Lan and Shaohua Tang}, title = {A secure image sharing scheme with high quality stego-images based on steganography}, journal = {Multim. Tools Appl.}, volume = {76}, number = {6}, pages = {7677--7698}, year = {2017}, url = {https://doi.org/10.1007/s11042-016-3429-8}, doi = {10.1007/S11042-016-3429-8}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/HeLT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icawst/LuCL17, author = {Yuching Lu and Goutam Chakraborty and Tzu{-}Chuen Lu}, title = {Hidden content quality aware stego-image hiding method using re-encoding strategy}, booktitle = {{IEEE} 8th International Conference on Awareness Science and Technology, iCAST 2017, Taichung, Taiwan, November 8-10, 2017}, pages = {1--6}, year = {2017}, crossref = {DBLP:conf/icawst/2017}, url = {https://doi.org/10.1109/ICAwST.2017.8256425}, doi = {10.1109/ICAWST.2017.8256425}, timestamp = {Mon, 09 Aug 2021 14:54:04 +0200}, biburl = {https://dblp.org/rec/conf/icawst/LuCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/AmirtharajanR12, author = {Rengarajan Amirtharajan and John Bosco Balaguru Rayappan}, title = {An intelligent chaotic embedding approach to enhance stego-image quality}, journal = {Inf. Sci.}, volume = {193}, pages = {115--124}, year = {2012}, url = {https://doi.org/10.1016/j.ins.2012.01.010}, doi = {10.1016/J.INS.2012.01.010}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/AmirtharajanR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cason/ChenCL10, author = {Kuo{-}Nan Chen and Chin{-}Chen Chang and Huang{-}Ching Lin}, title = {A Large Payload {EMD} Embedding Scheme with High Stego-image Quality}, booktitle = {International Conference on Computational Aspects of Social Networks, CASoN 2010, Taiyuan, China, 26-28 September 2010}, pages = {126--130}, year = {2010}, crossref = {DBLP:conf/cason/2010}, url = {https://doi.org/10.1109/CASoN.2010.35}, doi = {10.1109/CASON.2010.35}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cason/ChenCL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipta/AlmohammadG10, author = {Adel Almohammad and Gheorghita Ghinea}, title = {Stego image quality and the reliability of {PSNR}}, booktitle = {2nd International Conference on Image Processing Theory Tools and Applications, {IPTA} 2010, 7-10 July, 2010, Paris, France}, pages = {215--220}, year = {2010}, crossref = {DBLP:conf/ipta/2010}, url = {https://doi.org/10.1109/IPTA.2010.5586786}, doi = {10.1109/IPTA.2010.5586786}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipta/AlmohammadG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/KieuC09, author = {The Duc Kieu and Chin{-}Chen Chang}, title = {A high stego-image quality steganographic scheme with reversibility and high payload using multiple embedding strategy}, journal = {J. Syst. Softw.}, volume = {82}, number = {10}, pages = {1743--1752}, year = {2009}, url = {https://doi.org/10.1016/j.jss.2009.05.028}, doi = {10.1016/J.JSS.2009.05.028}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/KieuC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmm/ChangW06, author = {Chin{-}Chen Chang and Wen{-}Chuan Wu}, title = {A novel data hiding scheme for keeping high stego-image quality}, booktitle = {12th International Conference on Multi Media Modeling {(MMM} 2006), 4-6 January 2006, Beijing, China}, year = {2006}, crossref = {DBLP:conf/mmm/2006}, url = {https://doi.org/10.1109/MMMC.2006.1651324}, doi = {10.1109/MMMC.2006.1651324}, timestamp = {Wed, 25 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmm/ChangW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/WuHL03, author = {Mei{-}Yi Wu and Yu{-}Kun Ho and Jia{-}Hong Lee}, title = {A Method to Improve the Stego-Image Quality for Palette-Based Image Steganography}, booktitle = {Digital Watermarking, Second International Workshop, {IWDW} 2003, Seoul, Korea, October 20-22, 2003, Revised Papers}, pages = {483--496}, year = {2003}, crossref = {DBLP:conf/iwdw/2003}, url = {https://doi.org/10.1007/978-3-540-24624-4\_39}, doi = {10.1007/978-3-540-24624-4\_39}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/WuHL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ictas/2024, title = {Conference on Information Communications Technology and Society, {ICTAS} 2024, Durban, South Africa, March 7-8, 2024}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICTAS59620.2024}, doi = {10.1109/ICTAS59620.2024}, isbn = {979-8-3503-1491-5}, timestamp = {Mon, 07 Oct 2024 04:26:32 +0200}, biburl = {https://dblp.org/rec/conf/ictas/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icawst/2017, title = {{IEEE} 8th International Conference on Awareness Science and Technology, iCAST 2017, Taichung, Taiwan, November 8-10, 2017}, publisher = {{IEEE}}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/8241554/proceeding}, isbn = {978-1-5386-2965-9}, timestamp = {Mon, 07 Oct 2024 04:26:32 +0200}, biburl = {https://dblp.org/rec/conf/icawst/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cason/2010, title = {International Conference on Computational Aspects of Social Networks, CASoN 2010, Taiyuan, China, 26-28 September 2010}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://ieeexplore.ieee.org/xpl/conhome/5634609/proceeding}, isbn = {978-0-7695-4202-7}, timestamp = {Mon, 07 Oct 2024 04:26:32 +0200}, biburl = {https://dblp.org/rec/conf/cason/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ipta/2010, editor = {Khalifa Djemal and Mohamed A. Deriche}, title = {2nd International Conference on Image Processing Theory Tools and Applications, {IPTA} 2010, 7-10 July, 2010, Paris, France}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/xpl/conhome/5579546/proceeding}, isbn = {978-1-4244-7248-2}, timestamp = {Mon, 07 Oct 2024 04:26:32 +0200}, biburl = {https://dblp.org/rec/conf/ipta/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mmm/2006, title = {12th International Conference on Multi Media Modeling {(MMM} 2006), 4-6 January 2006, Beijing, China}, publisher = {{IEEE}}, year = {2006}, url = {https://ieeexplore.ieee.org/xpl/conhome/10988/proceeding}, isbn = {1-4244-0028-7}, timestamp = {Mon, 07 Oct 2024 04:26:32 +0200}, biburl = {https://dblp.org/rec/conf/mmm/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwdw/2003, editor = {Ton Kalker and Ingemar J. Cox and Yong Man Ro}, title = {Digital Watermarking, Second International Workshop, {IWDW} 2003, Seoul, Korea, October 20-22, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2939}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b95658}, doi = {10.1007/B95658}, isbn = {3-540-21061-X}, timestamp = {Mon, 07 Oct 2024 04:26:32 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.