COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA C OMMUNICATION
暂无分享,去创建一个
[1] Jie Zhang,et al. A Novel Secure Communication Protocol Combining Steganography and Cryptography , 2011 .
[2] Gustavus J. Simmons,et al. Subliminal channels; past and present , 2010, Eur. Trans. Telecommun..
[3] Jose L. Lopez-Bonilla. Scaling Factor for RGB Images to Steganography Applications , 2009 .
[4] Denis Pinkas,et al. SESAME: The solution to security for open distributed systems , 1994, Comput. Commun..
[5] A. J. Raphael,et al. Cryptography and Steganography – A Survey , 2022 .
[6] Chiang-Lung Liu,et al. High-performance JPEG steganography using complementary embedding strategy , 2008, Pattern Recognit..
[7] A. A. Zaidan,et al. On the Differences between Hiding Information and Cryptography Techniques: An Overview , 2010 .
[8] Ekta Walia,et al. An Analysis of LSB & DCT based Steganography , 2010 .
[9] Vasif V. Nabiyev,et al. Distortion free geometry based secret image sharing , 2011, WCIT.
[10] Nasir D. Memon,et al. Performance study of common image steganography and steganalysis techniques , 2006, J. Electronic Imaging.
[11] G. Athithan,et al. An Automated Approach to Solve Simple Substitution Ciphers , 1993, Cryptologia.
[12] Mandep Kaur,et al. A Dynamic RGB Intensity Based Steganography Scheme , 2010 .
[13] Kevin Knight,et al. Attacking Letter Substitution Ciphers with Integer Programming , 2009, Cryptologia.
[14] Andrew B. Watson,et al. Perceptual optimization of DCT color quantization matrices , 1994, Proceedings of 1st International Conference on Image Processing.
[15] William Stallings,et al. Cryptography and network security , 1998 .
[16] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[17] Maura Conway,et al. Code wars: Steganography, signals intelligence, and terrorism , 2003 .
[18] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[19] Andrew B. Watson,et al. Image Compression Using the Discrete Cosine Transform , 1994 .
[20] Abbas Cheddad,et al. Digital Image Steganography , 2009 .
[21] Mohammed Abbas Fadhil. A Novel Steganography-Cryptography System , 2010 .
[22] Bin Li,et al. A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..
[23] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[24] Bradley James Erickson,et al. Irreversible Compression of Medical Images , 2002, Journal of Digital Imaging.
[25] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[26] Roland Anderson. Cryptanalytig Properties of Short Substitution Ciphers , 1989, Cryptologia.
[27] Atul Kahate. Cryptography and Network Security , 2009 .
[28] George W. Hart. To decode short cryptograms , 1994, CACM.
[29] J. Todd. Book Review: Digital image processing (second edition). By R. C. Gonzalez and P. Wintz, Addison-Wesley, 1987. 503 pp. Price: £29.95. (ISBN 0-201-11026-1) , 1988 .
[30] Chet Hosmer,et al. Discovering Hidden Evidence , 2006, J. Digit. Forensic Pract..
[31] Jianjun Wang,et al. A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..