A study on image edge detection using the gradients, International Journal of Scientific and Research Publications, vol.2, issue.12, p.2012 ,
Text steganographic approaches: a comparison. arXiv preprint arXiv:1302, 2013. ,
DOI : 10.5121/ijnsa.2013.5107
URL : http://arxiv.org/abs/1302.2718
A steganography embedding method based on edge identification and xor coding. Expert systems with Applications, pp.293-306, 2016. ,
A Comparative Analysis of Image Steganography, International Journal of Computer Applications, vol.2, issue.3, pp.41-47, 2010. ,
DOI : 10.5120/644-900
Image steganalysis with binary similarity measures, EURASIP Journal on Advances in Signal Processing, issue.17, pp.1-9, 2005. ,
Fundamentals of image processing In Visual Perception for Manipulation and Imitation in Humanoid Robots, pp.67-89, 2009. ,
Image Deblurring in the Presence of Salt-and-Pepper Noise, International Conference on Scale-Space Theories in Computer Vision, pp.107-118, 2005. ,
DOI : 10.1007/11408031_10
Universal JPEG Steganalysis in the Compressed Frequency Domain, International Workshop on Digital Watermarking, pp.253-267, 2006. ,
DOI : 10.1007/11922841_21
Various image enhancement techniques-a critical review, International Journal of Advanced Research in Computer and Communication Engineering, vol.2, issue.3, p.2013 ,
A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier, Journal of global research in computer science, vol.2, issue.4, 2011. ,
Jean-François Couchot, and Raphä el Couturier. Blind digital watermarking in pdf documents using spread transform dither modulation ,
Edge detection, Computer Vision (CAP, vol.6415, issue.2, 2003. ,
A review paper: Noise models in digital image processing. arXiv preprint, 2015. ,
Image steganography and steganalysis: A survey, International Journal of Computer Applications, vol.52, issue.2, p.2012 ,
Digital image steganography: Survey and analysis of current methods, Signal Processing, vol.90, issue.3, pp.727-752, 2010. ,
DOI : 10.1016/j.sigpro.2009.08.010
Digital image steganography: Survey and analysis of current methods, Signal Processing, vol.90, issue.3, pp.727-752, 2010. ,
DOI : 10.1016/j.sigpro.2009.08.010
A review on digital image steganalysis techniques categorised by features extracted, image, vol.3, issue.4, p.2013 ,
Stabylo: steganography with adaptive, bbs, and binary embedding at low cost. annals of telecommunications-annales des t ´ eí ecommunications, pp.9-10441, 2015. ,
DOI : 10.1007/s12243-015-0466-7
URL : https://hal.archives-ouvertes.fr/hal-01303419
Selection-channel-aware rich model for Steganalysis of digital images, 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp.48-53, 2014. ,
DOI : 10.1109/WIFS.2014.7084302
A Sesure Image Steganography Using LSB Technique and Pseudo Random Encoding Technique, 2013. ,
A novel algorithm for colour image steganography using a new intelligent technique based on three phases, Appl. Soft Comput, vol.37, pp.830-846, 2015. ,
Retropubic, Laparoscopic, and Robot-Assisted Radical Prostatectomy: A Systematic Review and Cumulative Analysis of Comparative Studies, European Urology, vol.55, issue.5, pp.551037-1063, 2009. ,
DOI : 10.1016/j.eururo.2009.01.036
Gibbs construction in steganography Information Forensics and Security, IEEE Transactions on, vol.5, issue.4, pp.705-720, 2010. ,
Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes, International Workshop on Information Hiding, pp.67-81, 2004. ,
DOI : 10.1007/978-3-540-30114-1_6
Reliable detection of LSB steganography in color and grayscale images, Proceedings of the 2001 workshop on Multimedia and security new challenges, MM&Sec '01, pp.27-30, 2001. ,
DOI : 10.1145/1232454.1232466
Attacking the outguess, Proceedings of the ACM Workshop on Multimedia and Security, 2002. ,
Rich models for steganalysis of digital images. Information Forensics and Security, IEEE Transactions on, vol.7, issue.3, pp.868-882, 2012. ,
Rich Models for Steganalysis of Digital Images, IEEE Transactions on Information Forensics and Security, vol.7, issue.3, pp.868-882, 2012. ,
DOI : 10.1109/TIFS.2012.2190402
Kodovsk`y. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities, Proceedings of the 9th workshop on Multimedia & security, pp.3-14, 2007. ,
Rich Models for Steganalysis of Digital Images, IEEE Transactions on Information Forensics and Security, vol.7, issue.3, pp.868-882, 2012. ,
DOI : 10.1109/TIFS.2012.2190402
Kodovsk`y. Multivariate gaussian model for designing additive distortion for steganography, ICASSP, pp.2949-2953, 2013. ,
An overview of different type of data hiding scheme in image using steganographic techniques, International Journal of Advanced Research in Computer Science and Software Engineering, vol.4, issue.1, p.2014 ,
Adaptive noise reduction scheme for salt and pepper. arXiv preprint arXiv:1201, 2012. ,
DOI : 10.5121/sipij.2011.2405
Digital image processing, Nueva Jersey, 2008. ,
Image steganography techniques: an overview, International Journal of Computer Science and Security (IJCSS), vol.6, issue.3, pp.168-187, 2012. ,
On the capacity and security of steganography approaches: An overview, Journal of Applied Sciences, vol.10, pp.1825-1833, 2010. ,
Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT, IEEE Transactions on Information Forensics and Security, vol.10, issue.2, pp.219-228, 2015. ,
DOI : 10.1109/TIFS.2014.2364918
Random projections of residuals as an alternative to co-occurrences in steganalysis, Media Watermarking, Security, and Forensics 2013, 2013. ,
DOI : 10.1117/12.1000330
Universal distortion function for steganography in an arbitrary domain, EURASIP Journal on Information Security, vol.5, issue.2, pp.1-13, 2014. ,
DOI : 10.1007/978-3-642-55760-6
Universal distortion function for steganography in an arbitrary domain, EURASIP Journal on Information Security, vol.5, issue.2, pp.1-13, 2014. ,
DOI : 10.1007/978-3-642-55760-6
Designing steganographic distortion using directional filters, 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp.234-239, 2012. ,
DOI : 10.1109/WIFS.2012.6412655
URL : http://dde.binghamton.edu/vholub/pdf/WIFS12_Designing_Steganographic_Distortion_Using_Directional_Filters.pdf
Information-hiding using image steganography with pseudorandom permutation, Bangladesh Research Publications Journal, ISSN, pp.215-225, 1998. ,
A specific steganalysis approach to effective attacking the mb1, Chinese Journal of Electronics, vol.18, issue.4, 2009. ,
New system for secure cover file of hidden data in the image page within executable file using statistical steganography techniques, 2010. ,
Edge-based image steganography, EURASIP Journal on Information Security, vol.7, issue.2, 2014. ,
DOI : 10.1109/TIFS.2011.2175918
URL : https://doi.org/10.1186/1687-417x-2014-8
Image-based jpeg steganography, Tatra Mountains Mathematical Publications, vol.45, issue.1, pp.65-74, 2010. ,
Application of lsb based steganographic technique for 8-bit color images, World Academy of Science, Engineering and Technology, vol.50, pp.423-425, 2009. ,
Block-Based High Capacity Multilevel Image Steganography, Journal of Circuits, Systems and Computers, vol.2, issue.4, pp.1-21, 2016. ,
DOI : 10.1109/TIFS.2005.863485
Transform domain analysis of image steganography, International Journal for Science and Emerging Technologies with Latest Trends, vol.6, issue.1, pp.29-37, 2013. ,
Digital image enhancement, US Patent, vol.6, p.72538, 2000. ,
Comparison of standard image edge detection techniques and of method based on wavelet transform, International Journal of Advanced Research, vol.2, issue.8, pp.572-580, 2014. ,
Steganalysis of Digital Images Using Rich Image Representations and Ensemble Classifiers ,
Calibration revisited, Proceedings of the 11th ACM workshop on Multimedia and security, MM&Sec '09, pp.63-74, 2009. ,
DOI : 10.1145/1597817.1597830
Steganalysis of JPEG images using rich models, Media Watermarking, Security, and Forensics 2012, 2012. ,
DOI : 10.1117/12.907495
Ensemble Classifiers for Steganalysis of Digital Media, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.432-444, 2012. ,
DOI : 10.1109/TIFS.2011.2175919
Ensemble classifiers for steganalysis of digital media. Information Forensics and Security, IEEE Transactions on, vol.7, issue.2, pp.432-444, 2012. ,
Ensemble Classifiers for Steganalysis of Digital Media, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.432-444, 2012. ,
DOI : 10.1109/TIFS.2011.2175919
Pevn`y, and Jessica Fridrich. Modern steganalysis can detect yass, IS&T/SPIE Electronic Imaging International Society for Optics and Photonics, pp.754102-754102, 2010. ,
Analyzing edge detection techniques for feature extraction in dental radiographs, Perspectives in Science, vol.8, 2016. ,
DOI : 10.1016/j.pisc.2016.04.087
A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), pp.497-500, 2007. ,
DOI : 10.1109/IIH-MSP.2007.62
Fundamentals of image processing, Environmental Sensing, pp.83-109, 2012. ,
A survey on image steganography and steganalysis, Journal of Information Hiding and Multimedia Signal Processing, pp.142-172, 2011. ,
Fast Edge Detection by Center of Mass, Proceedings of the 1st IEEE/IIAE International Conference on Intelligent Systems and Image Processing 2013, pp.103-110, 2013. ,
DOI : 10.12792/icisip2013.024
Stego key searching for LSB steganography on JPEG decompressed image, SCIENCE CHINA Information Sciences, vol.59, issue.3, pp.321051-3210515, 2016. ,
Edge adaptive image steganography based on lsb matching revisited, IEEE Transactions on information forensics and security, vol.5, issue.2, pp.201-214, 2010. ,
Study and comparison of various image edge detection techniques, International journal of image processing (IJIP), vol.3, issue.1, pp.1-11, 2009. ,
A comprehensive review of image enhancement techniques. arXiv preprint, 2010. ,
Image Enhancement Techniques using Highpass and Lowpass Filters, International Journal of Computer Applications, vol.109, issue.14, p.2015 ,
DOI : 10.5120/19256-0999
URL : https://doi.org/10.5120/19256-0999
Developing fast machine learning techniques with applications to steganalysis problems, 2010. ,
URL : https://hal.archives-ouvertes.fr/tel-00737353
Edge Detection Techniques For Image Segmentation, International Journal of Computer Science and Information Technology, vol.3, issue.6, p.259, 2011. ,
DOI : 10.5121/ijcsit.2011.3620
High-performance JPEG steganography using quantization index modulation in DCT domain, Pattern Recognition Letters, vol.27, issue.5, pp.455-461, 2006. ,
DOI : 10.1016/j.patrec.2005.09.008
Information Hiding using Least Significant Bit Steganography and Blowfish Algorithm, International Journal of Computer Applications, vol.63, issue.13, p.2013 ,
DOI : 10.5120/10527-5510
URL : http://research.ijcaonline.org/volume63/number13/pxc3885510.pdf
Blind Image Steganalysis of JPEG images using feature extraction through the process of dilation, Digital Investigation, pp.67-77, 2014. ,
DOI : 10.1016/j.diin.2013.12.002
Steganalysis by Subtractive Pixel Adjacency Matrix, IEEE Transactions on Information Forensics and Security, vol.5, issue.2, pp.215-224, 2010. ,
DOI : 10.1109/TIFS.2010.2045842
URL : https://hal.archives-ouvertes.fr/hal-00541410
Break our steganographic system, 2010. ,
Merging Markov and DCT features for multi-class JPEG steganalysis, Security, Steganography, and Watermarking of Multimedia Contents IX, pp.650503-650503, 2007. ,
DOI : 10.1117/12.696774
URL : http://dde.binghamton.edu/tomas/pdfs/Pev07-SPIE.pdf
Digital image processing algorithms and applications, 2000. ,
Scharr gradient 5x5 convolution matrices guennadi (henry) levkine email: hlevkin at yahoo. com vancouver, canada, 2011. ,
Defending against statistical steganalysis, Usenix security symposium, pp.323-336, 2001. ,
A new steganography method which preserves histogram: Generalization of LSB++, Information Sciences, vol.277, pp.90-101, 2014. ,
DOI : 10.1016/j.ins.2014.02.007
Secured data transmission using wavelet based steganography and cryptography by using aes algorithm, Procedia Computer Science, vol.85, pp.62-69, 2016. ,
Integer Wavelet based Secret Data Hiding by Selecting Variable Bit Length, International Journal of Computer Applications, vol.48, issue.19, pp.7-11, 2012. ,
DOI : 10.5120/7454-0458
URL : http://research.ijcaonline.org/volume48/number19/pxc3880458.pdf
Survey on color image enhancement techniques using spatial filtering, International Journal of Computer Applications, vol.94, issue.9, p.2014 ,
Model-Based Steganography, International workshop on digital watermarking, pp.154-167, 2003. ,
DOI : 10.1007/978-3-540-24624-4_12
A review on edge detection techniques for image segmentation [86] HK Sawant and Mahentra Deore. A comprehensive review of image enhancement techniques, Int. J. Comp. Sci. Inform. Technol International Journal of Computer Technology and Electronics Engineering (IJCTEE), vol.5, issue.12, pp.5898-590039, 2010. ,
Smooth convolution-based distance functions, Graphical Models, vol.82, pp.67-76, 2015. ,
DOI : 10.1016/j.gmod.2015.06.004
Edge detection techniques for image segmentation?a survey of soft computing approaches, International journal of recent trends in engineering, vol.1, issue.2, 2009. ,
Detection of continuous, smooth and thin edges in noisy images using constrained particle swarm optimisation, Proceedings of the 13th annual conference on Genetic and evolutionary computation, GECCO '11, pp.45-52, 2011. ,
DOI : 10.1145/2001576.2001584
Hiral Tandel, Neelam Soni, and Ghanshyam I Prajapati. A hybrid approach for edge detection using fuzzy logic and canny method, International Journal of Engineering Research & Technology (IJERT), vol.2, issue.3, p.2013 ,
Different techniques of edge detection in digital image processing, International Journal of Engineering research and Applications, vol.3, issue.3, pp.458-461, 2013. ,
Comparison of different techniques for steganography in images, International Journal of Application or Innovation in Engineering & Management, vol.3, issue.2, p.2014 ,
Image steganography using integer wavelet transform based on color space approach, Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, pp.839-848, 2015. ,
Statistical restoration for robust and secure steganography, IEEE International Conference on Image Processing 2005, p.1118, 2005. ,
DOI : 10.1109/ICIP.2005.1530256
Fundamentals of Digital Image Processing: A practical approach with examples in Matlab, 2011. ,
DOI : 10.1002/9780470689776
A spatial domain image steganography technique based on plane bit substitution method, Global Journal of Computer Science and Technology Graphics & Vision, issue.15, pp.12-2012 ,
Image processing and data analysis: the multiscale approach, 1998. ,
DOI : 10.1017/CBO9780511564352
F5?a steganographic algorithm, Information Hiding: 4th International Workshop Proceedings, p.289, 2001. ,
A study of various steganographic techniques used for information hiding, 1401. ,
Nonlinear filter based image denoising using amf approach. arXiv preprint, 2010. ,
Computer imaging: digital image analysis and processing, 2005. ,
Steganographic algorithm jsteg Software available at http://zooid. org, 1993. ,
A comparative study of various types of image noise and efficient noise removal techniques. International journal of advanced research in computer science and software engineering, pp.617-622, 2013. ,
Common principles of image acquisition systems and biological vision, Proceedings of the IEEE, vol.90, issue.1, pp.5-17, 2002. ,
Attacks on Steganographic Systems, International workshop on information hiding, pp.61-76, 1999. ,
DOI : 10.1007/10719724_5
Decai Sun, and Zhiqiang Ruan. A learning-based steganalytic method against lsb matching steganography, Radioengineering, vol.20, issue.1, pp.102-109, 2011. ,
Filter selection based on representative training samples for multispectral imaging, Optik - International Journal for Light and Electron Optics, vol.127, issue.20, pp.9743-9754, 2016. ,
DOI : 10.1016/j.ijleo.2016.07.061
A novel edge detection for buried target extraction after SVD-2D wavelet processing, Journal of Applied Geophysics, vol.106, pp.106-113, 2014. ,
DOI : 10.1016/j.jappgeo.2014.04.016
Blind image steganalysis based on wavelet coefficient correlation Document generated with L AT E X and: the L AT E X style for PhD Thesis created by S. Galland ? http, Digital Investigation, pp.58-68, 2012. ,