Implementation and analysis of three steganographic approaches
暂无分享,去创建一个
[1] Nabarun Bagchi,et al. Secure BMP Image Steganography Using Dual Security Model (I.D.E.A, image intensity and Bit Randomization) and Max-Bit Algorithm , 2010 .
[2] Saudi Arabia,et al. A Novel Security Model Combining Cryptography and Steganography , 2004 .
[3] William Stallings,et al. Cryptography and network security , 1998 .
[4] Osama S. Farag Allah,et al. Encryption quality analysis of the RC5 block cipher algorithm for digital images , 2006 .
[5] Ingrid Verbauwhede,et al. On the high-throughput implementation of RIPEMD-160 hash algorithm , 2008, 2008 International Conference on Application-Specific Systems, Architectures and Processors.
[6] Subariah Ibrahim,et al. Information hiding using steganography , 2003, 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings..
[7] Mamta Juneja,et al. Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.
[8] C.E. Goutis,et al. Application of novel technique in RIPEMD-160 aiming at high-throughput , 2008, 2008 IEEE International Symposium on Industrial Electronics.
[9] V. Thanasoulis,et al. Application Of Novel Techniques In RIPEMD-160 Hash Function Aiming At High-Throughput , 2008 .
[10] Neha Sharma. AN ENCRYPTO-STEGO TECHNIQUE BASED SECURE DATA TRANSMISSION SYSTEM , 2005 .
[11] H. B. Kekre,et al. Increased Capacity of Information Hiding in LSB's Method for Text and Image , 2008 .
[12] Erik Zenner. Stream Cipher Criteria , 2006 .
[13] Tung-Sang Ng,et al. A unified architecture of MD5 and RIPEMD-160 hash algorithms , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[14] Ahmad Hamad,et al. Evaluation of the RC4 Algorithm for Data Encryption , 2006, Int. J. Comput. Sci. Appl..