A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique
暂无分享,去创建一个
[1] T. Ravichandran,et al. A Spatial Domain Image Steganography Technique Based on Matrix Embedding and Huffman Encoding , 2011 .
[2] Chao-Hung Lin,et al. A High Capacity 3D Steganography Algorithm , 2009, IEEE Transactions on Visualization and Computer Graphics.
[3] Mohammad A. AlAhmad,et al. Achieving Security for Images by LSB and MD5 , 2012 .
[4] Samir Kumar Bandyopadhyay,et al. A Method for Public Key Method of Steganography , 2010 .
[5] Shailender Gupta,et al. Information Hiding Using Least Significant Bit Steganography and Cryptography , 2012 .
[6] Md. Ismail Hossain,et al. A new approach for LSB based image steganography using secret key , 2011, 14th International Conference on Computer and Information Technology (ICCIT 2011).
[7] Jing-Ming Guo,et al. Secret Communication Using JPEG Double Compression , 2010, IEEE Signal Processing Letters.
[8] Adnan Khalid,et al. An enhanced least significant bit modification technique for audio steganography , 2011, International Conference on Computer Networks and Information Technology.
[9] Nasir D. Memon,et al. Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[10] Mritha Ramalingam,et al. Stego Machine – Video Steganography using Modified LSB Algorithm , 2011 .
[11] Ankit Chaudhary,et al. A hash based approach for secure keyless image steganography in lossless RGB images , 2012, 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems.
[12] Ekta Walia,et al. An Analysis of LSB & DCT based Steganography , 2010 .
[13] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998 .
[14] Yuan-Gen Wang,et al. Security Analysis on Spatial $\pm$1 Steganography for JPEG Decompressed Images , 2011, IEEE Signal Processing Letters.
[15] R. Akila,et al. A Comparative Analysis of Image Steganography , 2010 .
[16] John Langford,et al. Provably Secure Steganography , 2009, IEEE Trans. Computers.
[17] Adnan Abdul-Aziz Gutub,et al. RGB Intensity Based Variable-Bits Image Steganography , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.
[18] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[19] Deepesh Rawat,et al. A Steganography Technique for Hiding Image in an Image using LSB Method for 24 Bit Color Image , 2013 .
[20] A.A. Hanafy,et al. A secure covert communication model based on video steganography , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[21] P. R. Deshmukh,et al. Hash Based Least Significant Bit Technique For Video Steganography , 2014 .
[22] Mamta Juneja,et al. Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.
[23] Kousik Dasgupta,et al. HASH BASED LEAST SIGNIFICANT BIT TECHNIQUE FOR VIDEO STEGONAGRAPHY(HLSB) , 2012 .
[24] Ankit Chaudhary,et al. A Hash based Approach for Secure Keyless Steganography in Lossless RGB Images , 2012, ArXiv.
[25] Tung-Shou Chen,et al. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching , 2012, IEEE Transactions on Information Forensics and Security.
[26] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..