Cryptography and Digital Image Steganography Techniques
暂无分享,去创建一个
[1] Whitfield Diffie,et al. Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard , 1977, Computer.
[2] Yvo Desmedt,et al. A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes , 1986, CRYPTO.
[3] P. Yip,et al. Discrete Cosine Transform: Algorithms, Advantages, Applications , 1990 .
[4] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[5] Joan L. Mitchell,et al. JPEG: Still Image Data Compression Standard , 1992 .
[6] S. Tavares,et al. Known plaintext cryptanalysis of tree-structured block ciphers , 1995 .
[7] Eyal Kushilevitz,et al. From Differential Cryptanalysis to Ciphertext-Only Attacks , 1998, CRYPTO.
[8] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[9] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[10] Markus G. Kuhn,et al. Information hiding-A survey : Identification and protection of multimedia information , 1999 .
[11] William P. Wardlaw,et al. The RSA Public Key Cryptosystem , 2000 .
[12] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..
[13] Ian F. Blake,et al. On the Security of the Digital Signature Algorithm , 2002, Des. Codes Cryptogr..
[14] Chin-Chen Chang,et al. A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..
[15] William Stallings,et al. THE ADVANCED ENCRYPTION STANDARD , 2002, Cryptologia.
[16] Martin Boesgaard,et al. Rabbit: A New High-Performance Stream Cipher , 2003, FSE.
[17] Kris Gaj,et al. Facts and Myths of Enigma: Breaking Stereotypes , 2003, EUROCRYPT.
[18] David Salomon,et al. Data Privacy and Security , 2003, Springer New York.
[19] Huaiqing Wang,et al. Cyber warfare: steganography vs. steganalysis , 2004, CACM.
[20] Hideki Noda,et al. Application of BPCS steganography to wavelet compressed video , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[21] Gregory D. Abowd,et al. The ContextCam: Automated Point of Capture Video Annotation , 2004, UbiComp.
[22] Christophe Giraud,et al. A Survey on Fault Attacks , 2004, CARDIS.
[23] S. S. Iyengar,et al. Computationally efficient algorithms for a one-time pad scheme , 2004, International Journal of Computer & Information Sciences.
[24] Ajith Abraham,et al. Significance of steganography on data security , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[25] Kefa Rabah,et al. Steganography-The Art of Hiding Data , 2004 .
[26] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[27] Xinpeng Zhang,et al. Steganography using multiple-base notational system and human vision sensitivity , 2005, IEEE Signal Process. Lett..
[28] Thomas Stützle,et al. Ant colony optimization: artificial ants as a computational intelligence technique , 2006 .
[29] Hideki Noda,et al. A Model of Digital Contents Access Control System Using Steganographic Information Hiding Scheme , 2006, EJC.
[30] Xinpeng Zhang,et al. Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.
[31] Thomas Wollinger,et al. Fundamentals of Symmetric Cryptography , 2006 .
[32] J.-S. Coron. What Is Cryptography? , 2006, IEEE Secur. Priv..
[33] Weiming Zhang,et al. Improving Embedding Efficiency of Covering Codes for Applications in Steganography , 2007, IEEE Communications Letters.
[34] Christophe Clavier,et al. Passive and Active Combined Attacks on AES Combining Fault Attacks and Side Channel Analysis , 2007 .
[35] Guangrong Ji,et al. A New Method of Steganalysis Based on Image Entropy , 2007, ICIC.
[36] Jianjun Wang,et al. A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..
[37] V Ramaswamy,et al. Performance Enhancement Of Blowfish Algorithm By Modifying Its function , 2007 .
[38] Bart Preneel,et al. Differential-Linear Attacks Against the Stream Cipher Phelix , 2007, FSE.
[39] Xuejia Lai,et al. An analysis of international data encryption algorithm(IDEA) security against differential cryptanalysis , 2008, Wuhan University Journal of Natural Sciences.
[40] Angelos D. Keromytis,et al. Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers , 2008, ACISP.
[41] Yuqing Zhang,et al. Authenticated Diffie-Hellman key agreement protocol with forward secrecy , 2008, Wuhan University Journal of Natural Sciences.
[42] Sunita Prasad,et al. Security Enhancement in Data Encryption Standard , 2009, ICISTM.
[43] Saroj Kumar Panigrahy,et al. H-S-X Cryptosystem and Its Application to Image Encryption , 2009, 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies.
[44] Christof Paar,et al. The Advanced Encryption Standard (AES) , 2010 .
[45] Bart Preneel. Cryptographic Hash Functions: Theory and Practice , 2010, INDOCRYPT.
[46] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[47] Shen Wang,et al. A Secure Steganography Method based on Genetic Algorithm , 2010, J. Inf. Hiding Multim. Signal Process..
[48] Rainer Böhme,et al. Principles of Modern Steganography and Steganalysis , 2010 .
[49] William J. Spezeski. A Keyless Polyalphabetic Cipher , 2010 .
[50] Rupali B. Patil,et al. Image and Text Compression Using Dynamic Huffman and RLE Coding , 2011, SocProS.
[51] Debnath Bhattacharyya,et al. Image Data Hiding Technique Using Discrete Fourier Transformation , 2011, UCMA.
[52] Wasan Shaker Awad,et al. Information Hiding Using Ant Colony Optimization Algorithm , 2011, Int. J. Technol. Diffusion.
[53] Z. Azimifar,et al. Image steganography based on pixel ranking and Particle Swarm Optimization , 2012, The 16th CSI International Symposium on Artificial Intelligence and Signal Processing (AISP 2012).
[54] Jamshid Shanbehzadeh,et al. High Capacity Image Steganography Based on Genetic Algorithm and Wavelet Transform , 2012 .
[55] Arvind Kumar,et al. Enhanced Block Playfair Cipher , 2013, QSHINE.
[56] Song Y. Yan,et al. Quantum Resistant Cryptosystems , 2013 .
[57] S. Yan. Quantum Attacks on Public-Key Cryptosystems , 2013, Springer US.
[58] J. K. Mandal,et al. A Genetic Algorithm based Steganography Using Discrete Cosine Transformation (GASDCT) , 2013 .
[59] Ze-Nian Li,et al. Lossy Compression Algorithms , 2014 .
[60] A. Gupta,et al. Measuring the impact of security, trust and privacy in information sharing: A study on social networking sites , 2015 .
[61] Virendra Kumar Yadav,et al. A Novel Approach of Bulk Data Hiding using Text Steganography , 2015 .
[62] Gabriela Mogos,et al. Quantum Key Distribution Protocol with Four-State Systems – Software Implementation , 2015 .
[63] Imran Raza Khan,et al. Cryptanalysis of Image Encryption Algorithm Based on Fractional-Order Lorenz-Like Chaotic System , 2015 .
[64] Abraham Thomas,et al. Steganographic Technique Using Secure Adaptive Pixel Pair Matching for Embedding Multiple Data Types in Images , 2015, 2015 Fifth International Conference on Advances in Computing and Communications (ICACC).
[65] Aruna Malik,et al. A Modified Pixel-Value Differencing Image Steganographic Scheme with Least Significant Bit Substitution Method , 2015 .
[66] Hyoungshick Kim,et al. Visual Honey Encryption: Application to Steganography , 2015, IH&MMSec.
[67] Rinita Roy,et al. Optimization of Stego Image Retaining Secret Information Using Genetic Algorithm with 8-connected PSNR , 2015, KES.
[68] Ming Li,et al. Secure spread-spectrum data embedding with PN-sequence masking , 2015, Signal Process. Image Commun..
[69] D. Jude Hemanth,et al. Application of Genetic Algorithm and Particle Swarm Optimization techniques for improved image steganography systems , 2016 .
[70] Shuliang Sun,et al. A novel edge based image steganography with 2k correction and Huffman encoding , 2016, Inf. Process. Lett..
[71] Hanung Adi Nugroho,et al. Multiple layer data hiding scheme based on difference expansion of quad , 2017, Signal Process..
[72] Mohammad T. Khasawneh,et al. An Outlier-Based Intention Detection for Discovering Terrorist Strategies , 2017 .
[73] Kevin Curran,et al. An overview of steganography techniques applied to the protection of biometric data , 2017, Multimedia Tools and Applications.
[74] Komal Sharma,et al. Lossless data compression techniques and their performance , 2017, 2017 International Conference on Computing, Communication and Automation (ICCCA).
[75] Suvamoy Changder,et al. Performance analysis of image steganalysis techniques and future research directives , 2018, Int. J. Inf. Comput. Secur..
[76] Anand Jayant Kulkarni,et al. JPEG based steganography methods using Cohort Intelligence with Cognitive Computing and modified Multi Random Start Local Search optimization algorithms , 2018, Inf. Sci..
[77] Anand Jayant Kulkarni,et al. Improved Cohort Intelligence - A high capacity, swift and secure approach on JPEG image steganography , 2019, J. Inf. Secur. Appl..
[78] Manoj Kumar,et al. Information hiding with adaptive steganography based on novel fuzzy edge identification , 2019, Defence Technology.
[79] Christian Riess,et al. Image Forensics from Chroma Subsampling of High-Quality JPEG Images , 2019, IH&MMSec.
[80] Changho Kim,et al. A novel color image LSB steganography using improved 1D chaotic map , 2019, Multimedia Tools and Applications.
[81] Matija Črnjević. Cryptography and information security , 2019 .
[82] Ying Zou,et al. Research on image steganography analysis based on deep learning , 2019, J. Vis. Commun. Image Represent..
[83] Madini O. Alassafi,et al. Performance Analysis of Cryptographic Pseudorandom Number Generators , 2019, IEEE Access.
[84] Behnam Ghavami,et al. An image encryption method based on chaos system and AES algorithm , 2019, The Journal of Supercomputing.
[85] Tohari Ahmad,et al. Information hiding scheme for digital images using difference expansion and modulus function , 2018, J. King Saud Univ. Comput. Inf. Sci..