Application of data hiding in audio-video using anti forensics technique for authentication and data security
暂无分享,去创建一个
[1] S. K. Jagtap,et al. Intelligent processing: An approach of audio steganography , 2012, 2012 International Conference on Communication, Information & Computing Technology (ICCICT).
[2] Karim Abed-Meraim,et al. A view on latest audio steganography techniques , 2011, 2011 International Conference on Innovations in Information Technology.
[3] V. Sathya,et al. Data hiding in audio signal, video signal text and JPEG images , 2012, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012).
[4] Sree Narayana,et al. AUDIO - VIDEO STEGANOGRAPHY USING FORENSIC TECHNIQUEFOR DATA SECURITY , 2014 .
[5] Cheng-Hsing Yang,et al. Anti-Forensics with Steganographic Data Embedding in Digital Images , 2011, IEEE Journal on Selected Areas in Communications.
[6] Roman V. Yampolskiy,et al. Steganography and Visual Cryptography in Computer Forensics , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[7] Priyanka Gonnade,et al. Audio-Video steganography for Authentication and Data Security , 2015 .
[8] Nidal Nasser,et al. An audio/video crypto — Adaptive optical steganography technique , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).
[9] I. Adum Babu,et al. Application of Data Hiding in Audio -Video Using Anti Forensics Technique for Authentication and data Security , 2015 .
[10] R.S. Kawitkar,et al. Data Security Using Data Hiding , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).
[11] K. J. Ray Liu,et al. Forensic detection of image manipulation using statistical intrinsic fingerprints , 2010, IEEE Transactions on Information Forensics and Security.
[12] Hong-Juan Zhang,et al. Steganalysis of audio: attacking the Steghide , 2005, 2005 International Conference on Machine Learning and Cybernetics.
[13] M. Pooyan,et al. LSB-based Audio Steganography Method Based on Lifting Wavelet Transform , 2007, 2007 IEEE International Symposium on Signal Processing and Information Technology.
[14] K.C. Navada,et al. Determination of Sequences Responsible for Generation of a Sequence , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).