A steganographic scheme for secure communications based on the chaos and euler Theorem
暂无分享,去创建一个
[1] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[2] Ingemar J. Cox,et al. Watermarking applications and their properties , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[3] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[4] Shih-Kun Huang,et al. Cocktail Watermarking for Digital Image Protection , 2000, IEEE Trans. Multim..
[5] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[6] F. Dyson,et al. Period of a Discrete Cat Mapping , 1992 .
[7] Hannes Federrath,et al. Modeling the Security of Steganographic Systems , 1998, Information Hiding.
[8] Man Young Rhee. Cryptography and Secure Communications , 1993 .
[9] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[10] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[11] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[12] Garry Howell,et al. An Introduction to Chaotic dynamical systems. 2nd Edition, by Robert L. Devaney , 1990 .
[13] Der-Chyuan Lou,et al. Fault resilient and compression tolerant digital signature for image authentication , 2000, IEEE Trans. Consumer Electron..
[14] Der-Chyuan Lou,et al. Adaptive Digital Watermarking Using Fuzzy Clustering Technique , 2001 .
[15] John McHugh,et al. A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.
[16] Sushil Jajodia,et al. Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.
[17] David Thomas,et al. The Art in Computer Programming , 2001 .
[18] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[19] Chin-Chen Chang,et al. Fast exponentiation method obtained by folding the exponent in half , 1996 .
[20] R. Devaney. An Introduction to Chaotic Dynamical Systems , 1990 .
[21] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..