Steg-OFDM blend for highly secure multi-user communication
暂无分享,去创建一个
K. Thenmozhi | Rengarajan Amirtharajan | John Bosco Balaguru Rayappan | PadmaPriya Praveen Kumar | J. Rayappan | K. Thenmozhi | Rengarajan Amirtharajan | PadmaPriya Praveen Kumar
[1] Peter Jorgensen,et al. Applied cryptography: Protocols, algorithm, and source code in C: By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN 0-471-59756-2 , 1996 .
[2] Jeng-Shyang Pan,et al. An Information Hiding Scheme for OFDM Wireless Networks , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.
[3] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[4] Jeng-Shyang Pan,et al. Robust image watermarking based on multiple description vector quantisation , 2004 .
[5] Jeng-Shyang Pan,et al. An Information Hiding Scheme for the MDC-OFDM Wireless Networks , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[6] K. Thenmozhi,et al. Multi Carrier Steg against Omni Attacks , 2010 .
[7] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[8] Ramjee Prasad,et al. OFDM for Wireless Multimedia Communications , 1999 .
[9] Feng-Wen Sun,et al. User identification for convolutionally/turbo-coded systems and its applications , 2003, IEEE Trans. Commun..
[10] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[11] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.