On the Differences between Hiding Information and Cryptography Techniques: An Overview
暂无分享,去创建一个
A. A. Zaidan | Hamid A. Jalab | A. A. Zaidan | A. K. Al-Frajat | B. B. Zaidan | H. Jalab | B. Zaidan
[1] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.
[2] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[3] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[4] Moayad A. Fadhil,et al. Arabic Text Steganography using Kashida Extensions with Huffman Code , 2010 .
[5] Sajad Shirali-Shahreza,et al. High Capacity Persian/Arabic Text Steganography , 2008 .
[6] Omar Zakaria,et al. An Overview of Video Encryption Techniques , 2009 .
[7] T. Madhloom,et al. Novel Approach for High Secure and High Rate Data Hidden in the Image Using Image Texture Analysis , 2009 .
[8] Omar Zakaria,et al. Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard , 2010, ArXiv.
[9] Mihir Bellare,et al. Collision-Resistant Hashing: Towards Making UOWHFs Practical , 1997, CRYPTO.
[10] B. B. Zaidan,et al. Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation , 2009, ArXiv.
[11] Eiji Kawaguchi,et al. Principles and applications of BPCS steganography , 1999, Other Conferences.
[12] A. A. Zaidan,et al. A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm , 2010 .