Encryption technique using dynamic table and block division process on binary field
暂无分享,去创建一个
[1] Md Rashedul Islam,et al. An efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography , 2014, 2014 International Conference on Informatics, Electronics & Vision (ICIEV).
[2] V. Mahalakshmi,et al. Modulation of hiding intensity by channel intensity - Stego by pixel commando , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).
[3] J. K. Mandal,et al. Key based bit level genetic cryptographic technique (KBGCT) , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).
[4] Rengarajan Amirtharajan,et al. A novel audio steg for secret communication , 2014, 2014 International Conference on Communication and Signal Processing.
[5] Roman V. Yampolskiy,et al. Steganography and Visual Cryptography in Computer Forensics , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[6] Magdy Saeb,et al. An improved FPGA implementation of the modified hybrid hiding encryption algorithm (MHHEA) for data communication security , 2005, Design, Automation and Test in Europe.
[7] N.A. Ismail,et al. Secure perceptual data hiding technique using information theory , 2004, International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04..
[8] M. Shirali-Shahreza,et al. Text Steganography by Changing Words Spelling , 2008, 2008 10th International Conference on Advanced Communication Technology.
[9] Cheng-Hsing Yang,et al. Reversible VQ Data Hiding Based on Locally Adaptive Coding and Recursive Walking , 2009, 2009 2nd International Conference on Computer Science and its Applications.
[10] Himanshu Gupta,et al. ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION , 2011 .
[11] Vinod Kumar Sharma,et al. Multiphase Encryption: A New Concept in Modern Cryptography , 2013 .
[12] Gundeep Singh Bindra. Invisible Communication through Portable Document File (PDF) Format , 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[13] Mugurel Ionut Andreica,et al. SCONeP: Steganography and Cryptography approach for UDP and ICMP , 2011, 2011 RoEduNet International Conference 10th Edition: Networking in Education and Research.
[14] G A Sathish Kumar,et al. A secure triple level encryption method using cryptography and steganography , 2011, Proceedings of 2011 International Conference on Computer Science and Network Technology.
[15] M. Shirali-Shahreza. Pseudo-space Persian/Arabic text steganography , 2008, 2008 IEEE Symposium on Computers and Communications.
[16] V. P. Binu,et al. An effective private data storage and retrieval system using secret sharing scheme based on secure multi-party computation , 2014, 2014 International Conference on Data Science & Engineering (ICDSE).
[17] B. M. Imran,et al. An efficient steganographic technique based on chaotic maps and adpative PPM embedding , 2013, 2013 International Conference on Signal Processing , Image Processing & Pattern Recognition.
[18] Subhranil Som,et al. Cryptographic Technique using Substitution through Circular Path Followed by Genetic Function , 2013 .
[19] Nur Hadisukmana,et al. Steganography Software with Combination of Encryption Algorithms for Multimedia Files , 2011, 2011 First International Conference on Informatics and Computational Intelligence.
[20] Marjan Momtazpour,et al. Cipher-text classification with data mining , 2010, 2010 IEEE 4th International Symposium on Advanced Networks and Telecommunication Systems.
[21] S. Som,et al. Session Key Based Manipulated Iteration Encryption Technique (SKBMIET) , 2008, 2008 International Conference on Advanced Computer Theory and Engineering.
[22] Chaur-Chin Chen,et al. A jigsaw puzzle based secret key exchange scheme , 2008, 2008 International Conference on Machine Learning and Cybernetics.
[23] Wai Wai Zin,et al. Implementation and analysis of three steganographic approaches , 2011, 2011 3rd International Conference on Computer Research and Development.
[24] Marjan Momtazpour,et al. Application of data mining in cryptanalysis , 2009, 2009 9th International Symposium on Communications and Information Technology.
[25] Kuang Tsan Lin. Based on Binary Encoding Methods and Visual Cryptography Schemes to Hide Data , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[26] B. Murugeshwari,et al. An Efficient Method for Knowledge Hiding Through Database Extension , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.
[27] Poonam,et al. An enhanced Least Significant Bit steganography method using midpoint circle approach , 2014, 2014 International Conference on Communication and Signal Processing.