"ContSteg: Contourlet-Based Steganography Method"
written by Hedieh SAJEDI, Mansour JAMZAD,
published by Wireless Sensor Network, Vol.1 No.3, 2009
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Steganography Using Biometrics
Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics, 2018
[2] SVD-DCT Based Medical Image Watermarking in NSCT Domain
Quantum Computing:An Environment for Intelligent Large Scale Real Application, 2018
[3] ПРИМЕНЕНИЕ НЕКОТОРЫХ ПРЕОБРАЗОВАНИЙ ПРИ ВНЕДРЕНИИ ЦИФРОВЫХ ВОДЯНЫХ ЗНАКОВ В ИЗОБРАЖЕНИЯ
2018
[4] A Novel Multiplicative Steganography Technique in Contourlet Domain
2017
[5] Steganalysis based on steganography pattern discovery
Journal of Information Security and Applications, 2016
[6] A Multiple Criteria-Based Cost Function Using Wavelet and Edge Transformation for Medical Image Steganography
Journal of Intelligent Systems, 2016
[7] A new steganographic method using Contourlet Transform
2016
[8] Detection of Stego-Images in Communication among the Terrorist Boko-Haram Sect in Nigeria
Journal of Data Analysis and Information Processing, 2015
[9] Efficient Image Steganogrphic Algorithms Utilizing Transforms: Wavelet and Contourlet with Blowfish Encryption
2015
[10] Colour image steganography method based on sparse representation
IET Image Processing, 2015
[11] Transform domain techniques for image steganography
2014
[12] A Review on Classification Based Approaches for STEGanalysis Detection
International Journal of Computer Applications Technology and Research (IJCATR), 2014
[13] Current status and key issues in image steganography: A survey
Computer Science Review,Elsevier, 2014
[14] Adaptive image steganography using contourlet transform
Journal of Electronic Imaging, 2013
[15] A Novel Image Steganography in Contourletdomain Using Genetic Algorithm
2013
[16] A Secure Block Permutation Image Teganography Algorithm
International Journal on Cryptography and Information Security (IJCIS), 2013
[17] A Novel Secure Steganography In Contourlet Domain
International Journal of Trends in Economics Management & Technology (IJTEMT), 2013
[18] TEXT EMBEDDING BASED ON CONTOURELET TRANSFORMATION COEFFICIENTS
International Journal of Information Technology and Business Management, 2013
[19] A Secure Block Permutation Image Steganography Algorithm
2013
[20] Blind Image Steganalysis Based on Contourlet Transform
International Journal on Cryptography and Information Security (IJCIS), 2012
[21] Universal steganalysis using contourlet transform
2012
[22] CBS: contourlet-based steganalysis method
Journal of Signal Processing Systems,Springer Berlin Heidelberg, 2010