An enhanced security algorithm for wireless application using RSA and genetic approach
暂无分享,去创建一个
[1] M. Umamaheswari,et al. Analysis of Different Steganographic Algorithms for Secured Data Hiding , 2010 .
[2] Shu-Chuan Huang,et al. Colored digital watermarking technology based on visual cryptography , 2005 .
[3] Nasir D. Memon,et al. Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[4] Jamshid Shanbehzadeh,et al. A steganographic method based on Integer Wavelet Transform and Genetic Algorithm , 2011, 2011 International Conference on Communications and Signal Processing.
[5] S. Manoharan,et al. An Empirical Analysis of RS Steganalysis , 2008, 2008 The Third International Conference on Internet Monitoring and Protection.
[7] Jessica J. Fridrich,et al. Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.
[8] K Jithesh,et al. MULTI LAYER INFORMATION HIDING -A BLEND OF STEGANOGRAPHY AND VISUAL CRYPTOGRAPHY , 2010 .
[9] ASCII based Even-Odd Cryptography with Gray code and Image Steganography : A dimension in Data Security , 2011 .
[10] Chin-Chen Chang,et al. A new (t, n) threshold image hiding scheme for sharing a secret color image , 2003, International Conference on Communication Technology Proceedings, 2003. ICCT 2003..
[11] A. Adewumi. Some Improved Genetic-Algorithms Based Heuristics for Global Optimization with Innovative Applications , 2010 .
[12] Qingzhong Liu,et al. Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[13] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[14] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[15] Shyamalendu Kandar,et al. Variable Length Key based Visual Cryptography Scheme for Color Image using Random Number , 2011 .
[16] NEW ALGORITHM FOR HALFTONE IMAGE VISUAL CRYPTOGRAPHY , 2007 .
[17] K.M. Singh,et al. Stealth steganography in visual cryptography for half tone images , 2008, 2008 International Conference on Computer and Communication Engineering.
[18] Jessica J. Fridrich,et al. Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..
[19] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.