Image Security Using Triple Key Chaotic Encryption and SPIHT Compression Technique in Steganography
暂无分享,去创建一个
[1] Markus Jakobsson,et al. The Benefits of Understanding Passwords , 2012, HotSec.
[2] Sudhir Aggarwal,et al. Testing metrics for password creation policies by attacking large sets of revealed passwords , 2010, CCS '10.
[3] Meng Chang Chen,et al. An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics , 2014, Expert Syst. Appl..
[4] Deepa Kundur,et al. A stenographic framework for dual authentication and compression of high resolution imagery , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[5] Yan-yan Wang,et al. A more efficient and secure dynamic ID-based remote user authentication scheme , 2009, Comput. Commun..
[6] Stefanos D. Kollias,et al. An efficient fully unsupervised video object segmentation scheme using an adaptive neural-network classifier architecture , 2003, IEEE Trans. Neural Networks.
[7] Eun-Jun Yoon,et al. Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem , 2010, The Journal of Supercomputing.
[8] Cheng-Chi Lee,et al. A password authentication scheme over insecure networks , 2006, J. Comput. Syst. Sci..
[9] Muhammad Khurram Khan,et al. Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme' , 2011, Comput. Commun..
[10] Po-Yueh Chen,et al. A DWT Based Approach for Image Steganography , 2006 .
[11] K. R. Rao,et al. Steganography for a low bit-rate wavelet based image coder , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[12] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[13] Eun-Jun Yoon,et al. A SECURITY ENHANCED REMOTE USER AUTHENTICATION SCHEME USING SMART CARDS , 2012 .
[14] R. C. Mittal,et al. Dynamic ID-based remote user password authentication schemes using smart cards: A review , 2012, J. Netw. Comput. Appl..
[15] Alvaro Madero. Password secured systems and negative authentication , 2013 .
[16] S. Hemalatha,et al. A Secure Color Image Steganography In Transform Domain , 2013, ArXiv.
[17] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[18] Ashok Kumar Das,et al. A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications , 2013 .
[19] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[20] B. Raveendra Babu. A Novel Scheme for Digital Rights Management of Images Using Biometrics , 2009 .
[21] Shipeng Li,et al. Shape-adaptive discrete wavelet transforms for arbitrarily shaped visual object coding , 2000, IEEE Trans. Circuits Syst. Video Technol..