Encrypted Transfer of Confidential Information Using Steganography and Identity Verification Using Face Data
暂无分享,去创建一个
[1] Shiva Saxena,et al. Image steganography using AES encryption and least significant nibble , 2016, 2016 International Conference on Communication and Signal Processing (ICCSP).
[2] Umesh Ghanekar,et al. Image steganography based on Canny edge detection, dilation operator and hybrid coding , 2018, J. Inf. Secur. Appl..
[3] Naveen Kumar Gondhi,et al. A comparative analysis on various face recognition techniques , 2017, 2017 International Conference on Intelligent Computing and Control Systems (ICICCS).
[4] Soumen Bhowmik,et al. A new approach in color image steganography with high level of perceptibility and security , 2016, 2016 International Conference on Intelligent Control Power and Instrumentation (ICICPI).
[5] Daisy Jacobs,et al. Implementation of LSB Steganography and Its Evaluation for Various Bits , 2007, 2006 1st International Conference on Digital Information Management.
[6] Md. Ismail Hossain,et al. A new approach for LSB based image steganography using secret key , 2011, 14th International Conference on Computer and Information Technology (ICCIT 2011).
[7] Sahar A. El-Rahman,et al. A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information , 2016, Comput. Electr. Eng..
[8] Smita Kasar,et al. Security Improvisation in Steganography using AES 128/192/256 , 2014 .
[9] Ainuddin Wahid Abdul Wahab,et al. Image steganography in spatial domain: A survey , 2018, Signal Process. Image Commun..