An Image Authentication Technique in Frequency Domain Using Secure Hash Algorithm (FDSHA)
暂无分享,去创建一个
Soumadip Ghosh | Sushanta Biswas | Debasree Sarkar | Partha Pratim Sarkar | Amitava Nag | Debasish Biswas | A. Nag | S. Biswas | D. Sarkar | P. Sarkar | Soumadip Ghosh | Debasish Biswas
[1] Hesham Elzouka,et al. A Survey on Digital Watermarking Technologies , 2007, Security and Management.
[2] Xingang You,et al. A DCT-based image steganographic method resisting statistical attacks , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[3] Sushanta Biswas,et al. A novel technique for image steganography based on Block-DCT and Huffman Encoding , 2010, ArXiv.
[4] Ronald L. Rivest,et al. The MD4 Message-Digest Algorithm , 1990, RFC.
[5] Po-Yueh Chen,et al. A DWT Based Approach for Image Steganography , 2006 .
[6] Donald E. Eastlake,et al. US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.
[7] Ross Anderson,et al. Information hiding terminology , 1996 .
[8] Birgit Pfitzmann,et al. Trials of Traced Traitors , 1996, Information Hiding.
[9] Yan Lin,et al. A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression , 2003, IEEE Trans. Circuits Syst. Video Technol..
[10] V. Sridhar,et al. Multivariate entropy detector based hybrid image registration , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[11] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[12] Ning Liu,et al. Statistically Secure Digital Image Data Hiding , 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing.