Novel Text Steganography through Special Code Generation
暂无分享,去创建一个
Gautam Sanyal | Indradip Banerjee | Souvik Bhattacharyya | Souvik Bhattacharyya | G. Sanyal | Dr. Indradip Banerjee
[1] Jean-Luc Dugelay,et al. A guide tour of video watermarking , 2003, Signal Process. Image Commun..
[2] Lawrence O'Gorman,et al. Electronic Marking and Identification Techniques to Discourage Document Copying , 1995, IEEE J. Sel. Areas Commun..
[3] Dale K. Pace,et al. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1998 .
[4] William E. Winkler,et al. The State of Record Linkage and Current Research Problems , 1999 .
[5] Jan H. P. Eloff,et al. An overview of image steganography , 2005, ISSA.
[6] Krista Bennett,et al. LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .
[7] Lawrence O'Gorman,et al. Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.
[8] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.
[9] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[10] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[11] D. Kahn. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1967 .
[12] Kevin Curran,et al. An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.
[13] Goutam Sanyal,et al. Design and implementation of a Secure Text Based Steganography Model , 2010, Security and Management.
[14] Andrew Pyle. The father of modern science? Stephen Gaukroger Francis , 2002, The Lancet.
[15] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[16] Jean-Luc Dugelay,et al. Security pitfalls of frame-by-frame approaches to video watermarking , 2004, IEEE Transactions on Signal Processing.
[17] J F MCMANUS,et al. Galileo Galilei , 1965, Nature.
[18] Souvik Bhattacharyya,et al. A Novel Approach to Develop a Secure Image based Steganographic Model using Integer Wavelet Transform , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.
[19] L. Marvel. Information Hiding: Steganography and Watermarking , 2005 .
[20] Matthew A. Jaro,et al. Probabilistic linkage of large public health data files. , 1995, Statistics in medicine.