Logic Elements Consumption Analysis of Cellular Automata Based Image Encryption on FPGA
暂无分享,去创建一个
John Bosco Balaguru Rayappan | Rengarajan Amirtharaj | Sundararaman Rajagopala | Har Narayan Upadhyay | J. Rayappan | H. Upadhyay | R. Amirtharaj | S. Rajagopala
[1] Rengarajan Amirtharajan,et al. Horse Riding & Hiding in Image for Data Guarding , 2012 .
[2] Hao Luo,et al. Reversible Data Hiding Based on Hilbert Curve Scan and Histogram Modification , 2012 .
[3] K. Thenmozhi,et al. Secret Link Through Simulink: A Stego on OFDM Channel , 2014 .
[4] K. Thenmozhi,et al. Reversible Steganography on OFDM Channel-A Role of RS Coding , 2014 .
[5] Kiyoshi Tanaka,et al. A DCT-based Mod4 steganographic method , 2007, Signal Process..
[6] John Bosco Balaguru Rayappan,et al. Stego on Song-an Amalgam of vi and FPGA for Hardware Info Hide , 2014 .
[7] K. Thenmozhi,et al. Reversible Steganography on OFDM Channel: A Role of Cyclic Codes , 2014 .
[8] J. Rayappan,et al. Wavelet Pave the Trio Travel for a Secret Mission – A Stego Vision , 2011 .
[9] K. Thenmozhi,et al. Double Layer Encoded Encrypted Data on Multicarrier Channel , 2014 .
[10] K. Thenmozhi,et al. Pixel Forefinger for Gray in Color: A Layer by Layer Stego , 2012 .
[11] S. Wolfram. Statistical mechanics of cellular automata , 1983 .
[12] Rengarajan Amirtharajan,et al. An intelligent chaotic embedding approach to enhance stego-image quality , 2012, Inf. Sci..
[13] Hao Luo,et al. Joint Secret Sharing and Data Hiding for Block Truncation Coding Compressed Image Transmission , 2011 .
[14] R Sundararaman,et al. Stego System on Chip with LFSR based Information Hiding Approach , 2011 .
[15] Ja-Chen Lin,et al. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..
[16] M. M. Ari,et al. Evaluation of the Chemical Composition and Anti Nutritional Factors Levels of Different Thermally Processed Soybeans , 2012 .
[17] K. Thenmozhi,et al. Inserted Embedding in OFDM Channel: A Multicarrier Stego , 2014 .
[18] K. Thenmozhi,et al. Can we Reduce PAPR? OFDM+PTS+SLM+STEGO: A Novel Approach , 2013 .
[19] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[20] Rengarajan Amirtharajan,et al. Phase for Face saving-a multicarrier Stego , 2012 .
[21] Rengarajan Amirtharaj,et al. Brownian Motion of Binary, Gray-Binary and Gray Bits in Image for Stego , 2012 .
[22] John Bosco Balaguru Rayappan,et al. Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego , 2012 .
[23] Othman Omran Khalifa,et al. A review on multimedia communications cryptography , 2011 .
[24] K. Thenmozhi,et al. Spread and Hide-A Stego Transceiver , 2014 .
[25] K. Thenmozhi,et al. Stego in Multicarrier: A Phase Hidden Communication , 2014 .
[26] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[27] John Bosco Balaguru Rayappan,et al. High Capacity Triple Plane Embedding: A Colour Stego , 2013 .
[28] John Bosco Balaguru Rayappan,et al. Seeing and Believing is a Threat: A Visual Cryptography Schemes , 2013 .
[29] Ziba Eslami,et al. Secret image sharing based on cellular automata and steganography , 2010, Pattern Recognit..
[30] K. Thenmozhi,et al. OFDM+CDMA+Stego = Secure Communication: A Review , 2012 .
[31] John Bosco Balaguru Rayappan,et al. Pixel Indicates, Standard Deviates: A Way for Random Image Steganography , 2013 .
[32] Xinpeng Zhang,et al. Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security , 2004, Pattern Recognit. Lett..
[33] K. Thenmozhi,et al. Purposeful Error on OFDM: A Secret Channel , 2014 .
[34] K. Thenmozhi,et al. Data Puncturing in OFDM Channel: A Multicarrier Stego , 2014 .
[35] John Bosco Balaguru Rayappan,et al. Kubera Kolam: A Way for Random Image Steganography , 2013 .
[36] K. Thenmozhi,et al. Regulated OFDM-Role of ECC and ANN: A Review , 2012 .
[37] K. Thenmozhi,et al. Hide and seek in silicon - Performance analysis of Quad block Equisum Hardware Steganographic systems , 2012 .
[38] John Bosco Balaguru Rayappan,et al. Gyratory Assisted Info Hide-A Nibble Differencing for Message Embedding , 2014 .
[39] John Bosco Balaguru Rayappan,et al. Modeling Combo PR Generator for Stego Storage Self Test (SSST) , 2014 .
[40] J. Rayappan,et al. Multi (Carrier+Modulator) Adaptive System-an Anti Fading Stego Approach , 2014 .
[41] K. Thenmozhi,et al. Captivating CODEC Stego (CCS): A Cover on Camouflage , 2013 .
[42] John Bosco Balaguru Rayappan,et al. Pixel Indicated Triple Layer: A Way for Random Image Steganography , 2013 .
[43] John Bosco Balaguru Rayappan,et al. Steganography-Time to Time: A Review , 2013 .
[44] Xingming Sun,et al. An Excellent Image Data Hiding Algorithm Based on BTC , 2011 .
[45] John Bosco Balaguru Rayappan,et al. Pixel Indicated User Indicator: A Muxed Stego , 2013 .
[46] Rengarajan Amirtharaj,et al. Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA , 2012 .
[47] John Bosco Balaguru Rayappan,et al. Cover as Key and Key as Data: An Inborn Stego , 2014 .
[48] Rengarajan Amirtharaj,et al. Inverted Pattern in Inverted Time Domain for Icon Steganography , 2012 .
[49] John Bosco Balaguru Rayappan,et al. Mind Game for Cover Steganography: A Refuge , 2013 .
[50] Rengarajan Amirtharaj,et al. A New Steganography Algorithm against Chi Square Attack , 2013 .
[51] John Bosco Balaguru Rayappan,et al. Rubik's Cube: A Way for Random Image Steganography , 2013 .
[52] K. Thenmozhi,et al. Firmware for Data Security: A Review , 2012 .
[53] Balakrishnan Ramalingam,et al. LCC-LSB-FPGA Stego-A Reconfigurable Security , 2014 .
[54] K. Thenmozhi,et al. Humming Bird with Coloured Wings: A Feedback Security Approach , 2014 .
[55] Jiaohua Qin,et al. Random Image Steganography and Steganalysis: Present Status and Future Directions , 2012 .
[56] John Bosco Balaguru Rayappan,et al. MSB Based Embedding with Integrity: An Adaptive RGB Stego on FPGA Platform , 2014 .
[57] J. Rayappan,et al. Coded Crypted Converted Hiding (C3H)-A Stego Channel , 2014 .
[58] Parimal Pal Chaudhuri,et al. Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.
[59] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[60] John Bosco Balaguru Rayappan,et al. High Performance Pixel indicator For Colour Image Steganography , 2013 .
[61] John Bosco Balaguru Rayappan,et al. Why Image Encryption for Better Steganography , 2013 .