Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
暂无分享,去创建一个
Fazidah Othman | A. A. Zaidan | R. Z. Raji | Ahmed Wathik Naji | Bilal Bahaa Zaidan | Ahmed K. Hasan | B. Zaidan | A. Zaidan | A. Alaa | Fazidah Othman | A. K. Hasan | R. Raji | A. W. Naji | Zaidan-Masters Student | Mrs Fazidah Othman-Lecturer | Raji Zuhair | Raji-Masters Student | Ahmed K Hasan-Masters | Ahmed Wathik-Lecturer
[1] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[2] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.
[3] Paul Davern,et al. Steganography: Its History and Its Application to Computer Based Data Files , 1995 .
[4] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[5] 김인택. [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .
[6] Joshua R. Smith,et al. Modulation and Information Hiding in Images , 1996, Information Hiding.