Improved Cohort Intelligence—A high capacity, swift and secure approach on JPEG image steganography
Tài liệu tham khảo
Coron, 2006, What is cryptography?, IEEE Secur Privacy, 4, 70, 10.1109/MSP.2006.29
Mishra, 2015, A review on steganography and cryptography, 119
Petitcolas, 1999, Information hiding-a survey, Proc IEEE, 87, 1062, 10.1109/5.771065
Rabah, 2004, Steganography-the art of hiding data”, Inf Technol J, 3, 245, 10.3923/itj.2004.245.269
Venkatraman, 2004, Significance of steganography on data security
Miano, 1999
Sarmah, 2018, JPEG based steganography methods using cohort intelligence with cognitive computing and modified multi random start local search optimization algorithms, Inf Sci, 430-431, 378, 10.1016/j.ins.2017.11.027
Sarmah, 2017, Image steganography capacity improvement using cohort intelligence and modified multi random start local search methods, Arab J Sci Eng, 1
Tseng, 2004, Steganography using JPEG-compressed images, 12
Pannebaker, 1993
Raid, 2014, JPEG image compression using discrete cosine transform - a survey, Int J Comput Sci Eng Surv (IJCSES), 5, 60
Zhihua, 2010, JPEG image steganalysis using joint discrete cosine transform domain features, J Electron Imaging, 19
Rao, 1990
Böhme, 2010, Principles of Modern Steganography and Steganalysis
Chandramouli, 2004, Image steganography and steganalysis: concepts and practice, LNCS, 2939, 35
Wang, 2004, Cyber Warfare: Steganography vs. Steganalysis, Communications of the ACM-Voting Systems, 47, 76, 10.1145/1022594.1022597
Zhu, 2011, Blocking Artifacts Reduction in Compressed Data
Chan, 2004, Hiding data in images by simple LSB substitution, Pattern Recognit, 37, 469, 10.1016/j.patcog.2003.08.007
Chang, 2002, A steganographic method based upon JPEG and quantization table modification, Inf Sci, 141, 123, 10.1016/S0020-0255(01)00194-3
Cuiling, 2011, A high capacity steganographic method based on quantization table modification, J Nat Sci, 16, 223
Cheddad, 2010, Digital image steganography: survey and analysis of current methods, Signal Process, 90, 727, 10.1016/j.sigpro.2009.08.010
Li, 2007, A steganographic method based upon JPEG and particle swarm optimization algorithm, Inf Sci, 177, 3099, 10.1016/j.ins.2007.02.008
Jiang, 2011, 16, 223
Kulkarni, 2014, An information hiding system using 16*16 quantization table, 1
Zhang, 2007, Improving embedding efficiency of covering codes for applications in steganography, IEEE Commun Lett, 11, 680, 10.1109/LCOMM.2007.070438
Westfeld, 1999, Attacks on steganographic systems breaking the steganographic utilities EzStego, Jsteg, Steganos, and S-Tools-and some lessons learned, 61
Fridrich, 1999
Dorigo, 2006, Ant colony optimization: artificial ants as a computational intelligence technique, IEEE Comput Intell Mag, 1, 28, 10.1109/MCI.2006.329691
Elbeltagi, 2005, Comparison among five evolutionary-based optimization algorithms, Adv Eng Inf, 19, 43, 10.1016/j.aei.2005.01.004
Kennedy, 1995, Particle swarm optimization, 1942
Yuce, 2013, Honey bees inspired optimization method: the bees algorithm, Insects, 4, 646, 10.3390/insects4040646
Wasan, 2011, Information hiding using ant colony optimization algorithm, Int J Technol Diffus, 2, 16, 10.4018/jtd.2011010102
Ghasemi, 2012, High capacity image steganography based on genetic algorithm and wavelet transform, 110
Wang, 2010, A secure steganography method based on genetic algorithm, J Inf Hiding Multimed Signal Process, 1, 28
Wang, 2001, Image hiding by optimal LSB substitution and genetic algorithm, Pattern Recognit, 34, 671, 10.1016/S0031-3203(00)00015-7
Hedieh, 2017, Image steganalysis using artificial bee colony algorithm, J Exp Theor Artif Intell, 29, 949, 10.1080/0952813X.2016.1266037
Duraisamy, 2016, Application of genetic algorithm and particle swarm optimization techniques for improved image steganography systems, Open Phys, 14, 452, 10.1515/phys-2016-0052
Kulkarni, 2013, Cohort intelligence: a self supervised learning behaviour, 1396
Kulkarni, 2017, Cohort intelligence: a socio-inspired optimization method, 114, 10.1007/978-3-319-55312-2
Kulkarni, 2016, Solving 0-1 knapsack problem using cohort intelligence algorithm, I J Mach Learn Cybern, 7, 427, 10.1007/s13042-014-0272-y
Kulkarni, 2016, Application of the cohort intelligence optimization method to three selected combinatorial optimization problems, Eur J Oper Res, 250, 427, 10.1016/j.ejor.2015.10.008
Krishnasamy, 2014, A hybrid approach for data clustering based on modified cohort intelligence and K-means, Expert Syst Appl, 41, 6009, 10.1016/j.eswa.2014.03.021
Dhavle, 2018, Design and economic optimization of shell-and-tube heat exchanger using cohort intelligence algorithm, Neural Comput Appl, 30, 111, 10.1007/s00521-016-2683-z
Kulkarni, 2016, Constrained cohort intelligence using static and dynamic penalty function approach for mechanical components design, Int J Parallel Emergent Distrib Syst, 1
Kale, 2017, Cohort intelligence algorithm for discrete and mixed variable engineering problems, Int J Parallel Emergent Distrib Syst
Kulkarni, 2016, Probability collectives for solving discrete and mixed variable problems, Int J. Comput Aided Eng Technol, 8, 325, 10.1504/IJCAET.2016.079387
Li, 2009, A heuristic particle swarm optimization method for truss structures with discrete variables, Comput Struct, 87, 435, 10.1016/j.compstruc.2009.01.004
Wu, 2007, Genetic algorithms for nonlinear mixed discrete-integer optimization problems via metagenetic parameter optimizations, Eng Optim, 24, 137, 10.1080/03052159508941187
Wu, 1995, Steady-state genetic algorithms for discrete optimization of trusses, Comput Struct, 56, 979, 10.1016/0045-7949(94)00551-D
Shah, 2018, Design of fractional PID controller using cohort intelligence method, Front Inf Technol Electron Eng, 19, 437, 10.1631/FITEE.1601495
Patankar, 2018, Variations of cohort intelligence, Soft Comput, Springer, 22, 1731, 10.1007/s00500-017-2647-y
Almohammad, 2009, JPEG steganography: a performance evaluation of quantization tables, 471
Patel N.S., Abowd D.G. (2004): The ContextCam: automated point of capture video annotation, In: International conference on ubiquitous computing, LNCS 3205, pp 301–318.
Kawaguchi, 2007, A model of digital contents access control system using steganographic information hiding scheme, 50
Kobayashi, 1999, A method of embedding binary data into JPEG bit streams, IEICE Trans. Inf. Syst., J83-D-II, 1469
Kulkarni, 2013, Probability collectives for solving truss structure problems
Xin, 2017, Data embedding in digital images using critical functions, Signal Process Image Commun, 58, 146, 10.1016/j.image.2017.07.006
Liao, 2017, Separable data hiding in encrypted image based on compressive sensing and discrete Fourier transform, Multimed Tools Appl, 76, 20739, 10.1007/s11042-016-3971-4
Hussain, 2018, Image steganography in spatial domain: a survey, Signal Process Image Commun, 65, 46, 10.1016/j.image.2018.03.012
Baby, 2015, A novel DWT based image securing method using steganography, Proc Comput Sci, 46, 612, 10.1016/j.procs.2015.02.105
El-Emam, 2015, New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization, Comput Secur, 55, 21, 10.1016/j.cose.2015.06.012
Jarusek, 2018, Robust steganographic method based on unconventional approach of neural networks, Appl Soft Comput, 67, 505, 10.1016/j.asoc.2018.03.023
Atee, 2017, Extreme learning machine based optimal embedding location finder for image steganography, PLoS One, 12, 10.1371/journal.pone.0170329
Baluja, 2017, Hiding images in plain sight: deep steganography, 1
Zhaotong, 2018, Steganography with pixel-value differencing and modulus function based on PSO, J Inf Secur Appl, 43, 47
Kumar, 2018, Image steganography based on canny edge detection, dilation operator and hybrid coding, J Inf Secur Appl, 41, 41
Zheng, 2016, Fusion of block and keypoints based approaches for effective copy-move image forgery detection, Multidimension Syst Signal Process, 27, 989, 10.1007/s11045-016-0416-1
