MSB over hides LSB — A dark communication with integrity
暂无分享,去创建一个
Rengarajan Amirtharajan | John Bosco Balaguru Rayappan | Rambhatla Subrahmanyam | Pakalapati J S Prabhakar | R. Kavitha | J. Rayappan | R. Kavitha | Rengarajan Amirtharajan | P. J. Prabhakar | Rambhatla Subrahmanyam
[1] Adnan Abdul-Aziz Gutub,et al. Pixel Indicator High Capacity Technique for RGB Image Based Steganography , 2008 .
[2] Rengarajan Amirtharajan,et al. PVD Blend with Pixel Indicator - OPAP Composite for High Fidelity Steganography , 2010 .
[3] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[4] Peter Jorgensen,et al. Applied cryptography: Protocols, algorithm, and source code in C: By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN 0-471-59756-2 , 1996 .
[5] Tuomas Aura,et al. Practical Invisibility in Digital Communication , 1996, Information Hiding.
[6] Rengarajan Amirtharaj,et al. Stego on 2n:1 Platform for Users and Embedding , 2011 .
[7] R. Amirtharajan,et al. Publication of Little Lion Scientific R & D , Islamabad PAKISTAN DATA BATTLE ON THE DIGITAL FIELD BETWEEN HORSE CAVALRY AND INTERLOPERS , 2011 .
[8] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[9] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[10] Ja-Chen Lin,et al. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..
[11] John Bosco. Optimum Pixel & Bit location for Colour Image Stego- A Distortion Resistant Approach , 2010 .
[12] Rengarajan Amirtharajan,et al. Design and Analysis of Prototype Hardware for Secret Sharing Using 2-D Image Processing , 2010 .
[13] Rengarajan Amirtharajan,et al. Covered CDMA multi-user writing on spatially divided image , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[14] R. Amirtharajan,et al. Wave (let) decide choosy pixel embedding for stego , 2011, 2011 International Conference on Computer, Communication and Electrical Technology (ICCCET).
[15] Rengarajan Amirtharajan,et al. Colour Guided Colour Image Steganography , 2010, ArXiv.
[16] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[17] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[18] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[19] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[20] R. Amirtharajan,et al. Tri-layer stego for enhanced security - a keyless random approach , 2009, 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA).
[21] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[22] K. Thenmozhi,et al. Steg-OFDM blend for highly secure multi-user communication , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[23] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .