Security improvisation in image steganography using DES
暂无分享,去创建一个
[1] A. Nag,et al. An image steganography technique using X-box mapping , 2012, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012).
[2] Themrichon Tuithung,et al. A novel steganography method for image based on Huffman Encoding , 2012, 2012 3rd National Conference on Emerging Trends and Applications in Computer Science.
[3] D. Artz,et al. Digital steganography: hiding data within data , 2001 .
[4] Wei Liu,et al. Digital image encryption algorithm based on chaos and improved DES , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.
[5] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[6] J. Krenn,et al. Steganography and Steganalysis , 2006 .
[7] Faudziah Ahmad,et al. A Competitive Study of Cryptography Techniques over Block Cipher , 2011, 2011 UkSim 13th International Conference on Computer Modelling and Simulation.
[8] Publisher Kunderi Mahaboob,et al. Computer Technology and Application , 2014 .
[9] Edward F. Schaefer. A Simplified Data Encryption Standard Algorithm , 1996, Cryptologia.
[10] Merrill Warkentin,et al. Steganography and Steganalysis , 2006 .
[11] Saeed Reza Khosravirad,et al. Higher-order statistical steganalysis of random LSB steganography , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.
[12] Jasmin Cosic,et al. Steganography and steganalysis - does local web sites contain “Stego” contents? , 2010, Proceedings ELMAR-2010.
[13] Huayong Ge,et al. Steganography and steganalysis based on digital image , 2011, 2011 4th International Congress on Image and Signal Processing.
[14] Yambem Jina Chanu,et al. A short survey on image steganography and steganalysis techniques , 2012, 2012 3rd National Conference on Emerging Trends and Applications in Computer Science.
[15] Akhil Kaushik,et al. Block Encryption Standard for Transfer of data , 2010, 2010 International Conference on Networking and Information Technology.
[16] Alice E. Marwick,et al. Social Privacy in Networked Publics: Teens’ Attitudes, Practices, and Strategies , 2011 .
[17] J. Thomas Leontin Philjon,et al. Metamorphic cryptography — A paradox between cryptography and steganography using dynamic encryption , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).
[18] Abhishek Gupta,et al. Data hiding in color image using cryptography with help of ASK algorithm , 2011, 2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC).
[19] K. L. Shunmuganathan,et al. Steganography using edge adaptive image , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).
[20] Rosziati Ibrahim,et al. Steganography Algorithm to Hide Secret Message inside an Image , 2011, ArXiv.
[21] V. Meena,et al. Seeable visual but not sure of it , 2012, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012).
[22] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[23] Mengmeng Wang,et al. Digital image encryption algorithm based on pixels , 2010, 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems.
[24] Guy-Armand Yandji,et al. Research on a Normal File Encryption and Decryption , 2011, 2011 International Conference on Computer and Management (CAMAN).
[25] N. Xuan,et al. Digital image encryption algorithm based on chaos and improved DES , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.
[26] S. Kannan,et al. Secured secret color image sharing with steganography , 2012, 2012 International Conference on Recent Trends in Information Technology.
[27] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[28] K.R. Venugopal,et al. Authentication of secret information in image Steganography , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.