Multilayer Partially Homomorphic Encryption Text Steganography (MLPHE-TS): A Zero Steganography Approach
暂无分享,去创建一个
Rasheed Hussain | Nuzhat Naqvi | Aliya Tabassum Abbasi | Basheer Ahmad | M. Aihab Khan | Nuzhat Naqvi | Rasheed Hussain | M. A. Khan | Basheer Ahmad
[1] Nuzhat Naqvi,et al. Urdu text steganography: Utilizing isolated letters , 2015 .
[2] Lip Yee Por,et al. Information Hiding: A New Approach in Text Steganography , 2008 .
[3] Sathiamoorthy Manoharan,et al. A Comparative Review of Steganalysis Techniques , 2015, 2015 2nd International Conference on Information Science and Security (ICISS).
[4] Abdelrahman Altigani,et al. A hybrid approach to secure transmitted messages using advanced encryption standard (AES) and Word Shift Coding Protocol , 2013, 2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE).
[5] Zhangbing Zhou,et al. Audio steganography with AES for real-time covert voice over internet protocol communications , 2014, Science China Information Sciences.
[6] Harsh K. Verma,et al. A high capacity text steganography scheme based on LZW compression and color coding , 2017 .
[7] Mohammad Hassan Shirali-Shahreza,et al. A New Synonym Text Steganography , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[8] Vishnu Sharma,et al. Solving security issues in mobile computing using cryptography techniques — A Survey , 2015, International Conference on Computing, Communication & Automation.
[9] Wesam Bhaya,et al. Text Steganography based on Font Type in MS-Word Documents , 2013, J. Comput. Sci..
[10] Mohammad Hassan Shirali-Shahreza,et al. A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).
[11] Chia-Chen Lin,et al. A reversible information hiding scheme using left-right and up-down chinese character representation , 2009, J. Syst. Softw..
[12] Sangita Roy,et al. A novel approach to format based text steganography , 2011, ICCCS '11.
[13] Esra Satir,et al. A compression-based text steganography method , 2012, Journal of Systems and Software.
[14] Cao Qi,et al. A secure text steganography based on synonym substitution , 2013, IEEE Conference Anthology.
[15] Jie Zhu,et al. Steganography for MP3 audio by exploiting the rule of window switching , 2012, Comput. Secur..
[16] Samayveer Singh,et al. A high capacity email based text steganography scheme using Huffman compression , 2016, 2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN).
[17] Samayveer Singh,et al. An Email based high capacity text steganography scheme using combinatorial compression , 2014, 2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence).
[18] A. A. Mohamed. An improved algorithm for information hiding based on features of Arabic text: A Unicode approach , 2014 .
[19] R. Thamaraiselvan,et al. A Novel approach of Hybrid Method of Hiding the Text Information Using Stegnography , 2012 .
[20] Vijay H. Mankar,et al. Image steganography using redundant discrete wavelet transform and QR factorization , 2016, Comput. Electr. Eng..
[21] May Htet,et al. A New Embedding Algorithm for Data Security , 2015 .
[22] Haider Ismael Shahadi,et al. Concurrent hardware architecture for dual-mode audio steganography processor-based FPGA , 2016, Comput. Electr. Eng..
[23] Ahmad Reza Naghsh-Nilchi,et al. A novel joint secret image sharing and robust steganography method using wavelet , 2013, Multimedia Systems.
[24] Abdelrahman Desoky,et al. Listega: list-based steganography methodology , 2009, International Journal of Information Security.
[25] Ayan Biswas,et al. Hiding Data in Text Through Changing in Alphabet Letter Patterns (CALP) , 2011 .
[26] Nor Ashidi Mat Isa,et al. A data-hiding technique using scene-change detection for video steganography , 2016, Comput. Electr. Eng..
[27] Tao Zhang,et al. A novel blind detector for additive noise steganography in JPEG decompressed images , 2012, Multimedia Tools and Applications.
[28] Prem Singh,et al. A Novel Approach of Text Steganography based on null spaces , 2012 .
[29] Fei Wang,et al. A novel text steganography by context-based equivalent substitution , 2013, 2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013).
[30] KokSheik Wong,et al. UniSpaCh: A text-based data hiding method using Unicode space characters , 2012, J. Syst. Softw..
[31] Ganesh Aithal. A New Approach for Video Steganography Based on Randomization and Parallelization , 2016 .
[32] Munesh Chandra Trivedi,et al. Analysis of Different Text Steganography Techniques: A Survey , 2016, 2016 Second International Conference on Computational Intelligence & Communication Technology (CICT).
[33] Rongxing Lu,et al. Homomorphic Public Key Encryption Techniques , 2016 .
[34] Sung Wook Baik,et al. Image steganography using uncorrelated color space and its application for security of visual contents in online social networks , 2016, Future Gener. Comput. Syst..