Conversion of 2D Stegano Images into a 3D Stereo Image using RANSAC
Abstract
Keywords
Full Text:
PDFReferences
S.K.Moon, R.S.Kawitkar “Data Security using Data Hiding”International Conference on Computational Intelligence and Multimedia Applications– 2007.
Imran Sarwar Bajwa , Rubata Riasat “A New Perfect Hashing based Approach for Secure Steganograph” IEEE – 2011 pp:178.
Er.Rishma, Er.Lakhvir Singh , Er.Krishma Bhuchar “Biogeography Based Steganography For Color Images” IJARCSEE 2012.
Beenish Mehboob, Rashid Aziz Faruqui “A Steganography Implementation” IEEE – 2008
R.Amirtharajan , Sandeep Kumar Behera , Motamaari Abhilash Swarup “Colour Guided Colour Image Steganography” Universal Journal of computer Science and Engineering Technology – Oct 2011
Rosziati Ibrahim and Teoh Suk Kuan “Steganography Algorithm to Hide Secret Message inside an Image” Computer Technology and Application 2 (2011) 102-108. Transform”- IEEE 2009.
Mrs. Kavitha, Kavita Kadam, Ashwini Koshti, Priya Dunghav “Steganography Using Least Signicant Bit Algorithm” International Journal of Engineering Research and Applications (IJERA) May-Jun 2012, pp. 338-341.
R.O. EI Safy H. H. Zayed, EI Dessouki “An Adaptive Steganographic Technique Based on Integer Wavelet
Lokeswara Reddy, Dr. A. Subramanyam, Dr.P. Chenna Reddy “ Implementation of LSB Steganography and its Evaluation for Various File Formats” Int. J. Advanced Networking and Applications , Pages: 868-872 (2011).
Amirthanjan,R. Akila,R & Deepikachowdavarapu, P., 2010. A ComparativeAnalysis of Image Steganography, International Journal of Computer Application, 2(3), pp.2-10.
Bandyopadhyay, S.K., 2010. An Alternative Approach of Steganography Using Reference Image. International Journal of Advancements in Technology, 1(1), pp.05-11.
Bloom,J. A. et al.,2008. Digital watermarking and Steganography. 2nd ed. Morgan Kaufmann. Bishop, M., 2005. Introduction to computer security. 1st ed. Pearson publications.
Chan, C.K. Cheng, L.M., 2004. Hiding data in images by simple lsb substitution: pattern recognition.vol 37. Pergamon.
Cox, I. Miller, M. Bloom, J. Fridrich, J & Kalker, T. 2008. Digital watermarking and Steganography. 2nd Ed. Elsevi
Namita TiwarI, Dr.Madhu Shandilya “Evaluation of Various LSB based Methods of Image Steganography on GIF File Format”International Journal of Computer Applications (0975 – 8887) , September 2010.
Rahul Raguram , Jan-Michael Frahm , and Marc Pollefeys “A Comparative Analysis of RANSAC Techniques Leading to Adaptive Real-Time Random Sample Consensus” Springer-Verlag Berlin Heidelberg 2008 pp. 500–513.
Marco Zuliani, RANSAC 4 Dummies, August 13, 2012.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.