2013
DOI: 10.12785/amis/070213
|View full text |Cite
|
Sign up to set email alerts
|

A New Steganographic Method For Grayscale Image Using Graph Coloring Problem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…Image blocking takes place in both the special domain and the transform domain. In this paper, two steganography methods are selected, one of which is in the special domain [1], and the other in the transform domain [12], and the initial parameters are determined according to the bargain game model.…”
Section: Block Embeddingmentioning
confidence: 99%
See 2 more Smart Citations
“…Image blocking takes place in both the special domain and the transform domain. In this paper, two steganography methods are selected, one of which is in the special domain [1], and the other in the transform domain [12], and the initial parameters are determined according to the bargain game model.…”
Section: Block Embeddingmentioning
confidence: 99%
“…Douiri and et.al proposed a new algorithm for embedding information by graph coloring method on black and grayscale images [1]. This method has two major problems:…”
Section: Special Domain Casementioning
confidence: 99%
See 1 more Smart Citation
“…If the graph can be colored with k colors, the variables can be stored into k registers. There are a number of applications to other domains such as air traffic flow management, pattern matching of images, and an analysis of biological and archeological data [18,19,20].…”
Section: B Speaker-tts Voice Mappingmentioning
confidence: 99%
“…For heuristics and metaheuristics for MKPs and their variants, see recent works of [2,5,6,8,18,20,24,25,28,29,33,35,[47][48][49][50], and references therein. For graph theory applications, such as graph coloring, weighted maximum clique, and shortest path problems see [9,16,37,38]. Choi and Choi [7] proposed a redundancy identification method that is based on surrogate constraints.…”
Section: Introductionmentioning
confidence: 99%