Security Building at the Line of Control for Image Stego
暂无分享,去创建一个
Amirtharajan | John Bosco | Rengarajan | Benita Bose | Sasidhar Imadabathuni | Balaguru Rayappan | J. Bosco | B. Bose | B. Rayappan | Sasidhar Imadabathuni
[1] Rengarajan Amirtharajan,et al. Constructive Role of SFC & RGB Fusion versus Destructive Intrusion , 2010 .
[2] R. Amirtharajan,et al. Tri-layer stego for enhanced security - a keyless random approach , 2009, 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA).
[3] R. Akila,et al. A Comparative Analysis of Image Steganography , 2010 .
[4] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[5] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..
[6] Chin-Chen Chang,et al. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..
[7] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[8] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[9] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[10] Peter Wayner,et al. Disappearing Cryptography: Information Hiding: Steganography and Watermarking , 2008 .
[11] Rengarajan Amirtharajan,et al. PVD Blend with Pixel Indicator - OPAP Composite for High Fidelity Steganography , 2010 .
[12] Chin-Chen Chang,et al. A steganographic method for digital images using side match , 2004, Pattern Recognit. Lett..
[13] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[14] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[15] Ja-Chen Lin,et al. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..
[16] John Bosco. Optimum Pixel & Bit location for Colour Image Stego- A Distortion Resistant Approach , 2010 .
[17] Po-Yueh Chen,et al. A DWT Based Approach for Image Steganography , 2006 .
[18] Adnan Abdul-Aziz Gutub,et al. Pixel Indicator Technique for RGB Image Steganography , 2010 .
[19] Rengarajan Amirtharajan,et al. Colour Guided Colour Image Steganography , 2010, ArXiv.
[20] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[21] Peter Jorgensen,et al. Applied cryptography: Protocols, algorithm, and source code in C: By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN 0-471-59756-2 , 1996 .