Online payment system using steganography and visual cryptography
暂无分享,去创建一个
[1] A. E. Narayanan,et al. Notice of Violation of IEEE Publication PrinciplesNew visual Steganography scheme for secure banking application , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).
[2] K.R. Venugopal,et al. Secure Authentication using Image Processing and Visual Cryptography for Banking Applications , 2008, 2008 16th International Conference on Advanced Computing and Communications.
[3] Walter Bender,et al. Echo Hiding , 1996, Information Hiding.
[4] Tung-Shou Chen,et al. A new data hiding method in binary image , 2003, Fifth International Symposium on Multimedia Software Engineering, 2003. Proceedings..
[5] Jack Brassil. Hiding Information in Document Images , 2007 .
[6] Chuanxiong Guo,et al. Online Detection and Prevention of Phishing Attacks , 2006, 2006 First International Conference on Communications and Networking in China.
[7] Krista Bennett,et al. LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .
[8] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[9] R. Siva Rama Prasad,et al. An Evolution of Hindi Text Steganography , 2009, 2009 Sixth International Conference on Information Technology: New Generations.
[10] K. Thamizhchelvy,et al. E-Banking Security: Mitigating Online Threats Using Message Authentication Image (MAI) Algorithm , 2012, 2012 International Conference on Computing Sciences.
[11] Anand Sharma,et al. Visual cryptography improvises the security of tongue as a biometric in banking system , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).
[12] Sheng Dun Hu,et al. A Novel Video Steganography Based on Non-uniform Rectangular Partition , 2011, 2011 14th IEEE International Conference on Computational Science and Engineering.
[13] Abhinav Aggarwal,et al. Novel authentication system using visual cryptography , 2011, 2011 World Congress on Information and Communication Technologies.
[14] Xiaoyao Xie,et al. The security of shopping online , 2011, Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology.
[15] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[16] J C Judge,et al. Steganography: Past, Present, Future , 2001 .