Image Steganography Using Improved LSB And Exor Encryption Algorithm
暂无分享,去创建一个
[1] Edward J. Wegman,et al. Statistical Signal Processing , 1985 .
[2] R. Pal,et al. Image steganography using single digit sum with varying base , 2014, 2014 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT).
[3] R. Bhavani,et al. A modified secure digital image steganography based on Discrete Wavelet Transform , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).
[4] Akshay Girdhar,et al. Steganography using the Technique of Orderly Changing of Pixel Components , 2012 .
[5] William Stallings,et al. Network Security Essentials: Applications and Standards , 1999 .
[6] Sajad Shirali-Shahreza,et al. Steganography in Textiles , 2008, 2008 The Fourth International Conference on Information Assurance and Security.
[7] M. Chandrasekaran,et al. Novel approach for image stenography based on integer wavelet transform , 2012, 2012 IEEE International Conference on Computational Intelligence and Computing Research.
[8] Tao Zhang,et al. Detection of LSB matching steganography based on distribution of pixel differences in natural images , 2010, 2010 International Conference on Image Analysis and Signal Processing.
[9] Guillermo Sapiro,et al. Is image steganography natural? , 2005, IEEE Transactions on Image Processing.
[10] Li Zhi,et al. Detection of random LSB image steganography , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[11] D. Sharma,et al. A new cryptology approach for image encryption , 2012, 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing.
[12] A. K. Mandal,et al. Performance evaluation of cryptographic algorithms: DES and AES , 2012, 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.
[13] Fenlin Liu,et al. Detecting LSB steganography based on dynamic masks , 2005, 5th International Conference on Intelligent Systems Design and Applications (ISDA'05).
[14] Saeed Reza Khosravirad,et al. Higher-order statistical steganalysis of random LSB steganography , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.
[15] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[16] Sudhir Keshari,et al. Weighted fractional Fourier Transform based image Steganography , 2011, 2011 International Conference on Recent Trends in Information Systems.
[17] Wei Xu,et al. Realization of a LSB Information Hiding algorithm based on lifting wavelet transform image , 2011, 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC).
[18] K. Prasanthi,et al. A modern avatar of Julius Ceasar and Vigenere cipher , 2013, 2013 IEEE International Conference on Computational Intelligence and Computing Research.
[19] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[20] R.S. Kawitkar,et al. Data Security Using Data Hiding , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).
[21] Anatoly Sachenko,et al. Intelligent data acquisition and advanced computing systems , 2002, Comput. Stand. Interfaces.
[22] Md. Ismail Hossain,et al. A new approach for LSB based image steganography using secret key , 2011, 14th International Conference on Computer and Information Technology (ICCIT 2011).
[23] Tapio Seppänen,et al. Increasing the capacity of LSB-based audio steganography , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..
[24] Behrouz A. Forouzan,et al. Cryptography and network security , 1998 .
[25] Manoj Kumar Ramaiya,et al. Security improvisation in image steganography using DES , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).
[26] Themrichon Tuithung,et al. A novel steganography method for image based on Huffman Encoding , 2012, 2012 3rd National Conference on Emerging Trends and Applications in Computer Science.
[27] Yang Ren-er,et al. Image Steganography Combined with DES Encryption Pre-processing , 2014, 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation.
[28] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[29] M. Chandrasekaran,et al. A novel technique for image steganography using nonlinear chaotic map , 2013, 2013 7th International Conference on Intelligent Systems and Control (ISCO).
[30] Don H. Johnson,et al. Statistical Signal Processing , 2009, Encyclopedia of Biometrics.
[31] Bo Xu,et al. Practical Protocol Steganography: Hiding Data in IP Header , 2007, First Asia International Conference on Modelling & Simulation (AMS'07).
[32] S. Katzenbeisser,et al. A survey of steganographic techniques , .
[33] Anjali A. Shejul,et al. A DWT Based Approach for Steganography Using Biometrics , 2010, 2010 International Conference on Data Storage and Data Engineering.
[34] Kh.M. Singh,et al. Hiding Secret Message in Edges of the Image , 2007, 2007 International Conference on Information and Communication Technology.
[35] Jan H. P. Eloff,et al. An overview of image steganography , 2005, ISSA.