Image Steganography Using Improved LSB And Exor Encryption Algorithm

[1]  Edward J. Wegman,et al.  Statistical Signal Processing , 1985 .

[2]  R. Pal,et al.  Image steganography using single digit sum with varying base , 2014, 2014 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT).

[3]  R. Bhavani,et al.  A modified secure digital image steganography based on Discrete Wavelet Transform , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).

[4]  Akshay Girdhar,et al.  Steganography using the Technique of Orderly Changing of Pixel Components , 2012 .

[5]  William Stallings,et al.  Network Security Essentials: Applications and Standards , 1999 .

[6]  Sajad Shirali-Shahreza,et al.  Steganography in Textiles , 2008, 2008 The Fourth International Conference on Information Assurance and Security.

[7]  M. Chandrasekaran,et al.  Novel approach for image stenography based on integer wavelet transform , 2012, 2012 IEEE International Conference on Computational Intelligence and Computing Research.

[8]  Tao Zhang,et al.  Detection of LSB matching steganography based on distribution of pixel differences in natural images , 2010, 2010 International Conference on Image Analysis and Signal Processing.

[9]  Guillermo Sapiro,et al.  Is image steganography natural? , 2005, IEEE Transactions on Image Processing.

[10]  Li Zhi,et al.  Detection of random LSB image steganography , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[11]  D. Sharma,et al.  A new cryptology approach for image encryption , 2012, 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing.

[12]  A. K. Mandal,et al.  Performance evaluation of cryptographic algorithms: DES and AES , 2012, 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.

[13]  Fenlin Liu,et al.  Detecting LSB steganography based on dynamic masks , 2005, 5th International Conference on Intelligent Systems Design and Applications (ISDA'05).

[14]  Saeed Reza Khosravirad,et al.  Higher-order statistical steganalysis of random LSB steganography , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.

[15]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[16]  Sudhir Keshari,et al.  Weighted fractional Fourier Transform based image Steganography , 2011, 2011 International Conference on Recent Trends in Information Systems.

[17]  Wei Xu,et al.  Realization of a LSB Information Hiding algorithm based on lifting wavelet transform image , 2011, 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC).

[18]  K. Prasanthi,et al.  A modern avatar of Julius Ceasar and Vigenere cipher , 2013, 2013 IEEE International Conference on Computational Intelligence and Computing Research.

[19]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[20]  R.S. Kawitkar,et al.  Data Security Using Data Hiding , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[21]  Anatoly Sachenko,et al.  Intelligent data acquisition and advanced computing systems , 2002, Comput. Stand. Interfaces.

[22]  Md. Ismail Hossain,et al.  A new approach for LSB based image steganography using secret key , 2011, 14th International Conference on Computer and Information Technology (ICCIT 2011).

[23]  Tapio Seppänen,et al.  Increasing the capacity of LSB-based audio steganography , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..

[24]  Behrouz A. Forouzan,et al.  Cryptography and network security , 1998 .

[25]  Manoj Kumar Ramaiya,et al.  Security improvisation in image steganography using DES , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[26]  Themrichon Tuithung,et al.  A novel steganography method for image based on Huffman Encoding , 2012, 2012 3rd National Conference on Emerging Trends and Applications in Computer Science.

[27]  Yang Ren-er,et al.  Image Steganography Combined with DES Encryption Pre-processing , 2014, 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation.

[28]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[29]  M. Chandrasekaran,et al.  A novel technique for image steganography using nonlinear chaotic map , 2013, 2013 7th International Conference on Intelligent Systems and Control (ISCO).

[30]  Don H. Johnson,et al.  Statistical Signal Processing , 2009, Encyclopedia of Biometrics.

[31]  Bo Xu,et al.  Practical Protocol Steganography: Hiding Data in IP Header , 2007, First Asia International Conference on Modelling & Simulation (AMS'07).

[32]  S. Katzenbeisser,et al.  A survey of steganographic techniques , .

[33]  Anjali A. Shejul,et al.  A DWT Based Approach for Steganography Using Biometrics , 2010, 2010 International Conference on Data Storage and Data Engineering.

[34]  Kh.M. Singh,et al.  Hiding Secret Message in Edges of the Image , 2007, 2007 International Conference on Information and Communication Technology.

[35]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.