Cryptography Using Steganography: New Algorithms and Applications
暂无分享,去创建一个
[1] B. Hao,et al. Elementary Symbolic Dynamics And Chaos In Dissipative Systems , 1989 .
[2] Jorge A. González,et al. Chaotic and stochastic functions , 2000 .
[3] Ahmed H. Tewfik,et al. Robust audio watermarking using perceptual masking , 1998, Signal Process..
[4] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.
[5] Alessandra Lumini,et al. A wavelet-based image watermarking scheme , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[6] Facoltà Di Ingegneria. AN FPGA IMPLEMENTATION OF A CHAOTIC ENCRYPTION ALGORITHM , 2000 .
[7] Yôiti Suzuki,et al. Time-spread echo method for digital audio watermarking , 2005, IEEE Transactions on Multimedia.
[8] Xiaolu Li,et al. A Novel Hidden Transmission of Biometric Images Based on Chaos and Image Content , 2009, 2009 First International Workshop on Education Technology and Computer Science.
[9] Michael Herman,et al. Silent warfare: understanding the world of intelligence , 1992 .
[10] Eugene Lukacs,et al. Applications of characteristic functions , 1964 .
[11] W. J. Dowling,et al. Watermarking digital images for copyright protection , 1996 .
[12] Manuel Blum,et al. How to Generate Cryptographically Strong Sequences of Pseudo Random Bits , 1982, FOCS.
[13] Henry M. Gladney. Safeguarding Digital Library Contents and Users , 2009 .
[14] J. M. Blackledge,et al. A fractal modulation technique for digital communications systems , 1998, IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201).
[15] Jian Zhao,et al. Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.
[16] Eli Biham,et al. Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91 , 1991, EUROCRYPT.
[17] L. Kocarev. Chaos-based cryptography: a brief overview , 2001 .
[18] Jerome M. Shapiro,et al. Embedded image coding using zerotrees of wavelet coefficients , 1993, IEEE Trans. Signal Process..
[19] Bruce Schneier,et al. Beyond fear - thinking sensibly about security in an uncertain world , 2003 .
[20] Xiaomei Quan,et al. Audio watermarking based on psychoacoustic model and adaptive wavelet packets , 2004, Proceedings 7th International Conference on Signal Processing, 2004. Proceedings. ICSP '04. 2004..
[21] Xiangzhong Fang,et al. Spread-Spectrum Audio Watermark Robust Against Pitch-Scale Modification , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[22] B. S. Manjunath,et al. Technique for image data hiding and reconstruction without host image , 1999, Electronic Imaging.
[23] Antonio Ortega,et al. High capacity audio data hiding for noisy channels , 2001, Proceedings International Conference on Information Technology: Coding and Computing.
[24] R. Scheaffer,et al. Mathematical Statistics with Applications. , 1992 .
[25] Yin Xiong,et al. Covert Communication Audio Watermarking Algorithm Based on LSB , 2006, 2006 International Conference on Communication Technology.
[26] Birgit Pfitzmann,et al. Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals , 1996, Information Hiding.
[27] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[28] Akihiro Yamamoto,et al. A Digital Watermark Technique Based on the Wavelet Transform and Its Robustness on Image Compression and Transformation , 1999 .
[29] V. eIiAshchenko,et al. Cryptography: An Introduction , 2002 .
[30] Won Don Lee,et al. An image watermarking scheme with hidden signatures , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[31] Ioannis Pitas,et al. Circularly symmetric watermark embedding in 2-D DFT domain , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).
[32] Thierry Pun,et al. Secure Copyright Protection Techniques for Digital Images , 1998, Information Hiding.
[33] Mauro Barni,et al. A DCT-domain system for robust image watermarking , 1998, Signal Process..
[34] B. Jack Copeland,et al. Colossus: The secrets of Bletchley Park's code-breaking computers , 2006 .
[35] Mohan S. Kankanhalli,et al. Content based watermarking of images , 1998, MULTIMEDIA '98.
[36] Xiang-Gen Xia,et al. A multiresolution watermark for digital images , 1997, Proceedings of International Conference on Image Processing.
[37] Mauro Barni,et al. DWT-based technique for spatio-frequency masking of digital signatures , 1999, Electronic Imaging.
[38] Nasser Al-Ismaily. Dynamic block encryption with self-authenticating key exchange , 2005 .
[39] S. Mallat. A wavelet tour of signal processing , 1998 .
[40] W. Heitler. The Principles of Quantum Mechanics , 1947, Nature.
[41] Yuefen Chen,et al. Double random scrambling algorithm based on subblocks for image hiding , 2010, 2010 International Conference on Computer and Communication Technologies in Agriculture Engineering.
[42] Kineo Matsui,et al. Embedding a seal into a picture under orthogonal wavelet transform , 1996, Proceedings of the Third IEEE International Conference on Multimedia Computing and Systems.
[43] C H Oliveira,et al. Cryptography with chaos using Chua's system , 2011 .
[44] Min Wu,et al. Rotation-, scale-, and translation-resilient public watermarking for images , 2000, Electronic Imaging.
[45] Martin Turner,et al. Fractal geometry in digital imaging , 1998 .
[46] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[47] Julius O. Smith,et al. Watermarking sinusoidal audio representations by quantization index modulation in multiple frequencies , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[48] Johan Håstad,et al. Pseudo-random generators under uniform assumptions , 1990, STOC '90.
[49] Manuel Blum,et al. A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..
[50] Ingemar J. Cox,et al. A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.
[51] Che-Wei Lee,et al. A new steganographic method based on information sharing via PNG images , 2010, 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE).
[52] Robert A. J. Matthews,et al. On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.
[53] Khaled W. Mahmoud. Low-resolution watermarking for print security , 2004 .
[54] W. R. Mann,et al. Green's Functions; Introductory Theory with Applications , 1971 .
[55] I Pitas,et al. Image watermarking using block site selection and DCT domain constraints. , 1998, Optics express.
[56] Simon Singh,et al. The Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum Cryptography , 1999 .
[57] Bo Tao,et al. Adaptive watermarking in the DCT domain , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[58] V. Lazarescu,et al. New results using the audio watermarking based on wavelet transform , 2005, International Symposium on Signals, Circuits and Systems, 2005. ISSCS 2005..
[59] Wladyslaw Kozaczuk,et al. Enigma : how the German machine cipher was broken, and how it was read by the Allies in World War Two , 1984 .
[60] M. D. MacLaren. The Art of Computer Programming. Volume 2: Seminumerical Algorithms (Donald E. Knuth) , 1970 .
[61] Thierry Pun,et al. Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..
[62] S. Gupta,et al. Delta Function , 1964 .
[63] L. M. Pecora,et al. A CIRCUIT FOR STUDYING THE SYNCHRONIZATION OF CHAOTIC SYSTEMS , 1992 .
[64] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[65] Ahmed H. Tewfik,et al. Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).
[66] Eli Biham,et al. Differential Cryptanalysis of Feal and N-Hash , 1991, EUROCRYPT.
[67] H. White. Algorithmic complexity of points in dynamical systems , 1993, Ergodic Theory and Dynamical Systems.
[68] Leonid A. Levin,et al. Pseudo-random generation from one-way functions , 1989, STOC '89.
[69] J. G. Bryan,et al. Introduction to probability and random variables , 1961 .
[70] Tambe,et al. Driving systems with chaotic signals. , 1992, Physical review. A, Atomic, molecular, and optical physics.
[71] A. Brudno. Entropy and the complexity of the trajectories of a dynamical system , 1978 .
[72] Xiang-Yang Wang,et al. A Novel Synchronization Invariant Audio Watermarking Scheme Based on DWT and DCT , 2006, IEEE Transactions on Signal Processing.
[73] Evangelos Kranakis. Primality and cryptography , 1986, Wiley-Teubner series in computer science.
[74] S. Katsura,et al. Exactly solvable models showing chaotic behavior II , 1985 .
[75] Adrian S. Lewis,et al. Image compression using the 2-D wavelet transform , 1992, IEEE Trans. Image Process..
[76] Terry Ritter. The Efficient Generation of Cryptographic Confusion Sequences , 1991, Cryptologia.
[77] Yu-Huang Chu,et al. Dynamic data encryption system based on synchronised chaotic systems , 1999 .
[78] M.I. Aziz,et al. Introduction to Cryptography , 2002, 2005 International Conference on Microelectronics.
[79] Robert J. Safranek,et al. Signal compression based on models of human perception , 1993, Proc. IEEE.
[80] Ja-Ling Wu,et al. Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..
[81] Eric A. Suess,et al. Generating Random Numbers , 2010 .
[82] M.E. Moghaddam,et al. On-line signature verification using ANFIS , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.
[83] Michael F. Shlesinger. Perspectives in nonlinear dynamics : 28-30 May 1985 Naval Surface Weapons Center , 1986 .
[84] John M. Carroll,et al. Chaos in Cryptography: the Escape from the Strange Attractor , 1992, Cryptologia.
[85] Rashiq Rafiq Marie. Fractal-based models for Internet traffic and their application to secure data transmission , 2000 .
[86] Zbigniew Kotulski,et al. Discrete chaotic cryptography , 1997 .
[87] William Stallings,et al. Cryptography and network security , 1998 .
[88] Ahmed H. Tewfik,et al. Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[89] Oded Goldreich,et al. Introduction to Complexity Theory Notes for a One{semester Course , 2022 .
[90] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[91] Darko Kirovski,et al. Spread-spectrum watermarking of audio signals , 2003, IEEE Trans. Signal Process..
[92] Francis M. Boland,et al. Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[93] Yo-Sung Ho,et al. Digital audio watermarking in the cepstrum domain , 2000, IEEE Trans. Consumer Electron..
[94] Adnan M. Alattar. Smart Images using Digimarc's watermarking technology , 2000, Electronic Imaging.
[95] G. Hutchison,et al. Electronic data interchange , 1987, IEEE Network.
[96] Jinwoo Hong,et al. New echo embedding technique for robust and imperceptible audio watermarking , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[97] Deepa Kundur,et al. Digital watermarking using multiresolution wavelet decomposition , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).
[98] Leonid A. Levin,et al. One way functions and pseudorandom generators , 1987, Comb..
[99] John G. Proakis,et al. Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..
[100] Bruce Schneier,et al. A SELF-STUDY COURSE IN BLOCK-CIPHER CRYPTANALYSIS , 2000, Cryptologia.
[101] Sekharjit Datta,et al. Print protection using high-frequency fractal noise , 2004, IS&T/SPIE Electronic Imaging.
[102] Alastair Reed,et al. Digital watermarking using improved human visual system model , 2001, IS&T/SPIE Electronic Imaging.
[103] Erica Klarreich,et al. Take a chance: Scientists put randomness to work , 2004 .
[104] Deepa Kundur,et al. A robust digital image watermarking method using wavelet-based fusion , 1997, Proceedings of International Conference on Image Processing.
[105] John P Briggs. Fractals, The Patterns of Chaos / Discovering A New Aesthetic of Art, Science, and Nature , 1992 .
[106] Khaled W. Mahmoud,et al. Printed Document Authentication using Texture Coding , 2009 .
[107] Jiashu Zhang,et al. Robust Audio Watermarking Scheme Based on Nonuniform Discrete Fourier Transform , 2006, 2006 IEEE International Conference on Engineering of Intelligent Systems.
[108] Tapio Seppänen,et al. Fusing digital audio watermarking and authentication in diverse signal domains , 2005, 2005 13th European Signal Processing Conference.
[109] Leon O. Chua,et al. Experimental Demonstration of Secure Communications via Chaotic Synchronization , 1992, Chua's Circuit.
[110] E. G. Steward,et al. Fourier Optics: An Introduction, Second Edition. , 1989 .
[111] E. Alvarez,et al. New approach to chaotic encryption , 1999 .
[112] F. Vivaldi,et al. An algorithmic view of pseudochaos , 1999 .
[113] Daniel D. Wheeler,et al. Problems with Chaotic Cryptosystems , 1989, Cryptologia.
[114] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[115] J. Sethna. Statistical Mechanics: Entropy, Order Parameters, and Complexity , 2021 .
[116] R. F. Hoskins,et al. Theories of Generalised Functions: Distributions, Ultradistributions and Other Generalised Functions , 2005 .
[117] Phillip Rogaway,et al. A Software-Optimized Encryption Algorithm , 1998, Journal of Cryptology.
[118] Steven A. Tretter,et al. Introduction to Discrete-Time Signal Processing , 1976 .