Information hiding through dynamic text steganography and cryptography: Computing and Informatics
暂无分享,去创建一个
[1] Rahul Sharma,et al. XORSTEG: A new model of text steganography , 2016, 2016 International Conference on Communication and Electronics Systems (ICCES).
[2] A. J. Raphael,et al. Cryptography and Steganography – A Survey , .
[3] Suvamoy Changder,et al. A Novel Approach for Text Steganography: Generating Text Summary Using Reflection Symmetry☆ , 2013 .
[4] 조위덕. Cryptography , 1987, The Official (ISC)2 SSCP CBK Reference.
[5] Dilip Kumar Yadav,et al. A Novel Approach to Text Steganography Using Font Size of Invisible Space Characters in Microsoft Word Document , 2013, ICACNI.
[6] Narayan C. Debnath,et al. A Greedy Approach to Text Steganography Using Properties of Sentences , 2011, 2011 Eighth International Conference on Information Technology: New Generations.
[7] Peter van Emde Boas,et al. Preserving order in a forest in less than logarithmic time , 1975, 16th Annual Symposium on Foundations of Computer Science (sfcs 1975).
[8] Vineet Agarwal,et al. A new approach of text steganography based on mathematical model of number system , 2014, 2014 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2014].
[9] C. Shukla. A Survey of Steganography Technique, Attacks and Applications , 2014 .
[10] Masud Ibn Afjal,et al. Developing an efficient solution to information hiding through text steganography along with cryptography , 2014, 2014 9th International Forum on Strategic Technology (IFOST).
[11] Sangita Roy,et al. A novel approach to format based text steganography , 2011, ICCCS '11.
[12] Shangwei Shi,et al. An Approach to Text Steganography Based on Search in Internet , 2016, 2016 International Computer Symposium (ICS).
[13] Terry A. Welch,et al. A Technique for High-Performance Data Compression , 1984, Computer.
[14] Muhammad Sher,et al. Innocuous Communication via HTML Hiding Data in Plain Sight , 2013, Arabian Journal for Science and Engineering.