Secret data transmission using vital image steganography over transposition cipher
暂无分享,去创建一个
[1] Gandharba Swain,et al. A Technique for Secure Communication Using Message Dependent Steganography , 2010 .
[2] Dakshina Ranjan Kisku,et al. Data Hiding in Images Using Some Efficient Steganography Techniques , 2011, FGIT-SIP.
[3] Y. D. Chincholkar,et al. STEGANOGRAPHY FOR TWO AND THREE LSBs USING EXTENDED SUBSTITUTION ALGORITHM , 2013 .
[4] S. Padmapriya,et al. Performance Analysis of Various Encryption Algorithms for Data Communication , 2012 .
[5] Gandharba Swain,et al. A Dynamic Approach to Image Steganography Using the Three Least Significant Bits and Extended Hill Cipher , 2011 .
[6] Gandharba Swain,et al. Steganography using the twelve square substitution cipher and an index variable , 2011, 2011 3rd International Conference on Electronics Computer Technology.
[7] Md Rashedul Islam,et al. An efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography , 2014, 2014 International Conference on Informatics, Electronics & Vision (ICIEV).
[8] Jyoti Prakash Singh,et al. A Weighted Location Based LSB Image Steganography Technique , 2011, ACC.
[9] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[10] Bin Li,et al. A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..