A New Approach for Information Security using Asymmetric Encryption and Watermarking Technique
暂无分享,去创建一个
Rajeev Gupta | Manish Gupta | Girish Parmar | Darpan Anand | D. Anand | G. Parmar | Rajeev Gupta | Manish Gupta
[1] R. F. Sewell. Bulk encryption algorithm for use with RSA , 1993 .
[2] Kris Popat,et al. Novel cluster-based probability model for texture synthesis, classification, and compression , 1993, Other Conferences.
[3] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[4] Joan Daemen,et al. AES Proposal : Rijndael , 1998 .
[5] Chia-Hung Yeh,et al. Digital watermarking through quasi m-arrays , 1999, 1999 IEEE Workshop on Signal Processing Systems. SiPS 99. Design and Implementation (Cat. No.99TH8461).
[6] Tio M. M. Cedric,et al. Data concealment in audio using a nonlinear frequency distribution of PRBS coded data and frequency-domain LSB insertion , 2000, 2000 TENCON Proceedings. Intelligent Systems and Technologies for the New Millennium (Cat. No.00CH37119).
[7] Yeuan-Kuen Lee,et al. High capacity image steganographic model , 2000 .
[8] C.-C. Jay Kuo,et al. Robust and efficient digital audio watermarking using audio content analysis , 2000, Electronic Imaging.
[9] N. Bourbakis,et al. Lossless image compression and encryption using SCAN , 2001, Pattern Recognit..
[10] Jessica J. Fridrich,et al. Lossless Data Embedding—New Paradigm in Digital Watermarking , 2002, EURASIP J. Adv. Signal Process..
[11] Aloka Sinha,et al. A technique for image encryption using digital signature , 2003 .
[12] Hyoung Joong Kim,et al. Audio Watermarking Techniques , 2004 .
[13] Aman Jantan,et al. AN APPROACH TO ENHANCE IMAGE ENCRYPTION USING BLOCK- BASED TRANSFORMATION ALGORITHM by MOHAMMAD ALI MOH'D BANI YOUNES , 2009 .
[14] Gaurav Bhatnagar,et al. Joint watermarking and encryption for still visual data , 2012, Multimedia Tools and Applications.