Author:
Sarmah Dipti Kapoor,Kulkarni Anand J.,Abraham Ajith
Publisher
Springer International Publishing
Reference9 articles.
1. Almohammad, A., Ghinea, G., Hierons, R.M.: JPEG steganography: a performance evaluation of quantization tables. In: Proceedings of International Conference on Advanced Information Networking and Applications, Bradford, UK, 26–29 May 2009, pp. 471–478 (2009)
2. Kawaguchi, E., Maeta, M., Noda, H., Nozaki, K.: A model of digital contents access control system using steganographic information hiding scheme. In: Proceedings of Information Modeling and Knowledge Bases XVIII, Trojanovice, Czech Republic, 29 May–2 June 2006, pp. 50–61 (2006)
3. Kulkarni, A.J., Durugkar, I.P., Kumar, M.: Cohort intelligence: a self supervised learning behavior. In: Proceedings of the 2013 IEEE International Conference on Systems, Man and Cybernetics, IEEE Computer Society, Washington, DC, USA, 13–16 October 2013, pp. 1396–1400 (2013)
4. Li, X., Wang, J.: A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf. Sci. 177, 3099–3109 (2007)
5. Patel, N.S., Abowd, D.G.: The contextcam: automated point of capture video annotation. In: Davies, N., Mynatt, E.D., Siio, I. (eds.) UbiComp 2004: Ubiquitous Computing, UbiComp 2004, Lecture Notes in Computer Science (LNCS), vol. 3205, pp 301–318. Springer, Berlin (2004)