Compression Multi-Level Crypto Stego Security of Texts Utilizing Colored Email Forwarding
暂无分享,去创建一个
Abrar Alsaidi | Adnan Abdul-Aziz Gutub | Manal Al-Ghamdi | Khulood Al-lehaibi | Huda Alzahrani | A. Gutub | Abrar Alsaidi | Huda A. Alzahrani | M. Al-Ghamdi | Khulood Al-lehaibi
[1] Farhan Khan,et al. Message Concealment Techniques using Image based Steganography , 2007 .
[2] D. Artz,et al. Digital steganography: hiding data within data , 2001 .
[3] S. Arabia,et al. Implementation of a pipelined modular multiplier architecture for GF(p) elliptic curve cryptography computation , 2011 .
[4] Nouf A. Al-Otaibi,et al. 2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers , 2014 .
[5] Adnan Abdul-Aziz Gutub,et al. A Novel Arabic Text Steganography Method Using Letter Points and Extensions , 2007 .
[6] A. A-A Gutub,et al. Hybrid Crypto Hardware Utilizing Symmetric-Key and Public-Key Cryptosystems , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).
[7] Basem Y. Alkazemi,et al. LIGHT-WEIGHT CRYPTOGRAPHY TO SECURE MEDICAL DATA IN IOT , 2017 .
[8] Adnan Abdul-Aziz Gutub,et al. Fast 160-Bits GF (P) Elliptic Curve Crypto Hardware of High-Radix Scalable Multipliers , 2006, Int. Arab J. Inf. Technol..
[9] Salah A. Aly,et al. INTELLIGENT RECOGNITION SYSTEM FOR IDENTIFYING ITEMS AND PILGRIMS , 2018 .
[10] A. Gutub,et al. SERIAL VS. PARALLEL ELLIPTIC CURVE CRYPTO PROCESSOR DESIGNS , 2013 .
[11] Arambam James Singh,et al. Understanding Steganography over Cryptography and Various Steganography Techniques , 2015 .
[12] Adnan Abdul-Aziz Gutub,et al. Counting-based secret sharing technique for multimedia applications , 2019, Multimedia Tools and Applications.
[13] M. Shirali-Shahreza,et al. Steganography in TeX documents , 2008, 2008 3rd International Conference on Intelligent System and Knowledge Engineering.
[14] Adnan Abdul-Aziz Gutub,et al. Multi-Bits Stego-System For Hiding Text in Multimedia Images Based on User Security Priority , 2018 .
[15] M. Shirali-Shahreza,et al. Text Steganography in SMS , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).
[16] Shahir Akram Hassan,et al. Integrity verification for digital Holy Quran verses using cryptographic hash function and compression , 2020, J. King Saud Univ. Comput. Inf. Sci..
[17] Khan Farhan Rafat. Enhanced text steganography in SMS , 2009, 2009 2nd International Conference on Computer, Control and Communication.
[18] Adnan Abdul-Aziz Gutub,et al. Subthreshold SRAM Designs for Cryptography Security Computations , 2011, ICSECS.
[19] Adnan Abdul-Aziz Gutub,et al. Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography , 2018 .
[20] Adnan Abdul-Aziz Gutub,et al. Efficient Adders to Speedup Modular Multiplication for Cryptography , 2008 .
[21] Christof Paar,et al. Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .
[22] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[23] Harsh K. Verma,et al. A high capacity text steganography scheme based on LZW compression and color coding , 2017 .