Implementation of reversible Data Hiding in Encrypted Image using A-S Algorithm
暂无分享,去创建一个
Aswin Achuthshankar | Aswathy Achuthshankar | K. P. Arjun | N. M. Sreenarayanan | K. Arjun | Aswin Achuthshankar | Aswathy Achuthshankar
[1] A. Murat Tekalp,et al. Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.
[2] T. D. B. Weerasinghe,et al. An effective RC4 stream cipher , 2013, 2013 IEEE 8th International Conference on Industrial and Information Systems.
[3] A. J. Raphael,et al. Cryptography and Steganography – A Survey , .
[4] Chao-Hsi Huang,et al. RFID systems integrated OTP security authentication design , 2013, 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference.
[5] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[6] Yuan Yan Tang,et al. Scalable Compression of Stream Cipher Encrypted Images Through Context-Adaptive Sampling , 2014, IEEE Transactions on Information Forensics and Security.
[7] Hardikkumar V. Desai. Steganography, Cryptography, Watermarking: A Comparative Study , 2012 .
[8] S. O. Sharif,et al. Performance analysis of stream and block cipher algorithms , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[9] Xinpeng Zhang,et al. Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.
[10] Yuhei Nagao,et al. Hardware Implementation of High Throughput RC4 algorithm , 2012, 2012 IEEE International Symposium on Circuits and Systems.
[11] Changda Wang,et al. Book Cipher with Infinite Key Space , 2008, 2008 International Symposium on Information Science and Engineering.
[12] Chaple Gopal,et al. Reversible Data Hiding in Encrypted Images , 2014 .
[13] Qamar Abbas,et al. Energy efficient sensor network security using Stream cipher mode of operation , 2010, 2010 International Conference on Computer and Communication Technology (ICCCT).
[14] Lin Ding,et al. Cryptanalysis of Lightweight WG-8 Stream Cipher , 2014, IEEE Transactions on Information Forensics and Security.
[15] Aswin Achuthshankar,et al. A novel symmetric cryptography algorithm for fast and secure encryption , 2015, 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO).
[16] K. S. Rangasamy,et al. SEPARABLE REVERSIBLE DATA HIDING USING COMPRESSION IN ENCRYPTED IMAGE , 2013 .
[17] ByungRae Cha,et al. Design and Efficiency Analysis of New OTP System Using Homomorphic Graph of Fingerprint Features , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.
[18] Kamred UdhamSingh. A Survey on Image Steganography Techniques , 2014 .
[19] Chhattar Singh Lamba. Design and Analysis of Stream Cipher for Network Security , 2010, 2010 Second International Conference on Communication Software and Networks.
[20] Mohammad V. Malakooti,et al. A new symmetric cryptography algorithm to secure e-commerce transactions , 2010, 2010 International Conference on Financial Theory and Engineering.
[21] S. Indarjani,et al. Comparison the insertion attack effects on randomness property of Dragon and Rabbit stream cipher , 2013, 2013 International Conference on Computer, Control, Informatics and Its Applications (IC3INA).
[22] R. Murugesh. Advanced biometric ATM machine with AES 256 and steganography implementation , 2012, 2012 Fourth International Conference on Advanced Computing (ICoAC).
[23] Xinpeng Zhang,et al. Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.
[24] Muhammad Khurram Khan,et al. OTP-Based Two-Factor Authentication Using Mobile Phones , 2011, 2011 Eighth International Conference on Information Technology: New Generations.
[25] Xinpeng Zhang,et al. Reversible Data Hiding With Optimal Value Transfer , 2013, IEEE Transactions on Multimedia.
[26] N. Sujatha,et al. A review of some recent stream ciphers , 2013, 2013 International conference on Circuits, Controls and Communications (CCUBE).
[27] Hyotaek Lim,et al. Online banking authentication system using mobile-OTP with QR-code , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.
[28] Wai Wai Zin,et al. Implementation and analysis of three steganographic approaches , 2011, 2011 3rd International Conference on Computer Research and Development.
[29] Xiaofeng Wang,et al. An Improved Algorithm of Stream Cipher Based on LFSR , 2012, 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.
[30] B. Achiriloaie,et al. VI REFERENCES , 1961 .
[31] Weiming Zhang,et al. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption , 2013, IEEE Transactions on Information Forensics and Security.
[32] Othman Omran Khalifa,et al. A new method for generating cryptographically strong sequences of pseudo random bits for stream cipher , 2010, International Conference on Computer and Communication Engineering (ICCCE'10).
[33] Tung-Shou Chen,et al. An Improved Reversible Data Hiding in Encrypted Images Using Side Match , 2012, IEEE Signal Processing Letters.
[34] Jian Xie,et al. An improved RC4 stream cipher , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[35] Chang Nian Zhang,et al. RC4 state and its applications , 2011, 2011 Ninth Annual International Conference on Privacy, Security and Trust.
[36] Shikha Sharda,et al. Image Steganography: A Review , 2013 .
[37] Navneet Kaur,et al. A Survey on various types of Steganography and Analysis of Hiding Techniques , 2014 .
[38] ByungRae Cha,et al. Design of New OTP System Using Homomorphic Graph by Changed Location and Angle of Fingerprint Features , 2008, 2008 International Symposium on Ubiquitous Multimedia Computing.
[39] Rakesh Shukla,et al. Sampurna Suraksha: Unconditionally Secure and Authenticated One Time Pad Cryptosystem , 2013, 2013 International Conference on Machine Intelligence and Research Advancement.