Design and Analysis of Prototype Hardware for Secret Sharing Using 2-D Image Processing
暂无分享,去创建一个
Rengarajan Amirtharajan | Vivek Ganesan | R.John Bosco Balaguru | V. Ganesan | R. Balaguru | Rengarajan Amirtharajan
[1] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[2] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[3] Alessandra Conversi,et al. Comparative Analysis , 2009, Encyclopedia of Database Systems.
[4] R. Akila,et al. A Comparative Analysis of Image Steganography , 2010 .
[5] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[6] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[7] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[8] Jessica J. Fridrich,et al. New methodology for breaking steganographic techniques for JPEGs , 2003, IS&T/SPIE Electronic Imaging.
[9] Peter Jorgensen,et al. Applied cryptography: Protocols, algorithm, and source code in C: By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN 0-471-59756-2 , 1996 .
[10] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .