A Robust and Secure Methodology for Network Communications
暂无分享,去创建一个
[1] Ajith Abraham,et al. Significance of steganography on data security , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[2] Gadadhar Sahoo,et al. Some new methodologies for secured data coding and transmission , 2010, Int. J. Electron. Secur. Digit. Forensics.
[3] Claudio Soriente,et al. Taking advantages of a disadvantage: Digital forensics and steganography using document metadata , 2007, J. Syst. Softw..
[4] Yun Q. Shi,et al. Formatted text document data hiding robust to printing, copying and scanning , 2005, 2005 IEEE International Symposium on Circuits and Systems.
[5] K.B. Raja,et al. A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.
[6] Scott Craver,et al. On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.
[7] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[8] Ahmed H. Tewfik,et al. Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[9] D. Artz,et al. Digital steganography: hiding data within data , 2001 .
[10] Bret Dunbar,et al. A detailed look at Steganographic Techniques and their use in an Open-Systems Environment , 2002 .
[11] Gadadhar Sahoo,et al. Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization , 2008 .
[12] Lisa M. Marvel,et al. A methodology for data hiding using images , 1998, IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201).
[13] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[14] Christian Cachin,et al. An information-theoretic model for steganography , 2004, Inf. Comput..
[15] Wen-Hsiang Tsai,et al. A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique , 2007, IEEE Transactions on Information Forensics and Security.
[16] Subariah Ibrahim,et al. Information hiding using steganography , 2003, 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings..
[17] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.