Overview of watermarking and cryptography to combine both for real time speech communication
暂无分享,去创建一个
[1] Wojciech Mazurczyk,et al. Multilevel Steganography: Improving Hidden Communication in Networks , 2011, J. Univers. Comput. Sci..
[2] Bret Dunbar,et al. A detailed look at Steganographic Techniques and their use in an Open-Systems Environment , 2002 .
[3] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[4] R. Umarani,et al. UR5:A Novel Symmetrical Encryption Algorithm With Fast Flexible and High Security Based On Key Updation , 2012 .
[5] Frank Boland,et al. Watermarking digital images for copyright protection , 1995 .
[6] M. L. Valarmathi,et al. A Study on Watermarking Schemes for Image Authentication , 2010 .
[7] Wenjun Zeng,et al. Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..
[8] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[9] R. Umarani,et al. UMARAM: A novel fast encryption algorithm for data security in local area network , 2010, 2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES.
[10] Mohey M. Hadhoud,et al. Evaluating The Performance of Symmetric Encryption Algorithms , 2010, Int. J. Netw. Secur..
[11] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.
[12] John Langford,et al. Provably Secure Steganography , 2002, IEEE Transactions on Computers.
[13] Chang-Tsun Li,et al. One-dimensional neighborhood forming strategy for fragile watermarking , 2003, J. Electronic Imaging.
[14] Ahmed H. Tewfik,et al. Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).
[15] Martin F. H. Schuurmans,et al. Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.
[16] Bruce Schneier,et al. Practical cryptography , 2003 .
[17] William Stallings,et al. Network Security Essentials: Applications and Standards , 1999 .
[18] Ralph Howard,et al. Data encryption standard , 1987 .
[19] Eric Cole,et al. Hiding in Plain Sight: Steganography and the Art of Covert Communication , 2003 .
[20] R. Akila,et al. A Comparative Analysis of Image Steganography , 2010 .
[21] Jaime Raigoza,et al. Evaluating Performance of Symmetric Encryption Algorithms , 2016, 2016 International Conference on Computational Science and Computational Intelligence (CSCI).
[22] W. J. Dowling,et al. Watermarking digital images for copyright protection , 1996 .
[23] Edward J. Delp,et al. Digital watermarking: algorithms and applications , 2001, IEEE Signal Process. Mag..
[24] Bernd Girod,et al. Digital watermarking of raw and compressed video , 1996, Other Conferences.
[25] Lawrence O'Gorman,et al. Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.
[26] Nicolas Pugeault,et al. Advances in Visual Computing , 2007, Lecture Notes in Computer Science.
[27] Pierre Duhamel,et al. An asymmetric watermarking method , 2003, IEEE Trans. Signal Process..