Innovative Data Hiding Security Model Using Forensic Audio Video Crypto-Steganography
暂无分享,去创建一个
[1] Rosanne English. Comparison of high capacity steganography techniques , 2010, 2010 International Conference of Soft Computing and Pattern Recognition.
[2] Siti Zaiton Mohd Hashim,et al. A robust video watermarking technique for the tamper detection of surveillance systems , 2015, Multimedia Tools and Applications.
[3] Roman V. Yampolskiy,et al. Steganography and Visual Cryptography in Computer Forensics , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[4] Hamdy M. Kelash,et al. Hiding data in video sequences using steganography algorithms , 2013, 2013 International Conference on ICT Convergence (ICTC).
[5] Mircea Vladutiu,et al. Decreasing Change Impact Using Smart LSB Pixel Mapping and Data Rearrangement , 2011, 2011 IEEE 11th International Conference on Computer and Information Technology.
[6] K.R. Venugopal,et al. Authentication of secret information in image Steganography , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.
[7] Sunil K. Moon,et al. Analysis of secured video steganography using computer forensics technique for enhance data security , 2013, 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013).
[8] Amal Said Khalifa,et al. Video steganography: a comprehensive review , 2015, Multimedia Tools and Applications.
[9] S. P. Bansod,et al. Modified BPCS steganography using Hybrid cryptography for improving data embedding capacity , 2012, 2012 International Conference on Communication, Information & Computing Technology (ICCICT).
[10] Gandharba Swain,et al. LSB Array Based Image Steganography Technique by Exploring the Four Least Significant Bits , 2011 .
[11] Vijay H. Mankar,et al. Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..
[12] Kulbir Singh,et al. Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform , 2017, J. Inf. Process. Syst..
[13] Cheng-Hsing Yang,et al. Anti-Forensics with Steganographic Data Embedding in Digital Images , 2011, IEEE Journal on Selected Areas in Communications.
[14] Nidal Nasser,et al. An audio/video crypto — Adaptive optical steganography technique , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).
[15] Gautam Sanyal,et al. Pixel mapping method (PMM) based bit plane complexity segmentation (BPCS) steganography , 2011, 2011 World Congress on Information and Communication Technologies.
[16] Zhaohui Li,et al. A technique of improved steganography text based on chaos and BPCS , 2010, 2010 2nd International Conference on Advanced Computer Control.