A Hybrid Cryptographic and Steganographic Security Approach for Identity Management and Security of Digital Images
暂无分享,去创建一个
Laurent Nana | Anca Pascu | Quist-Aphetsi Kester | Nii Narku Quaynor | Sophie Gire | Jojo Moses Eghan
[1] Chien-Yeh Hsu,et al. Implementing globally unique identifier architecture in date collection for a health management study in taiwan aboriginal tribe , 2015 .
[2] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[3] Haitham Badi,et al. Artificial neural network for steganography , 2014, Neural Computing and Applications.
[4] Mohammad Sabzinejad Farash,et al. Cryptanalysis and improvement of ‘an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks’ , 2015, Int. J. Netw. Manag..
[5] Theodosis Mourouzis,et al. Optimizations in algebraic and differential cryptanalysis , 2015 .
[6] Yuguang Fang,et al. An ID-based Framework Achieving Privacy and Non-Repudiation in Vehicular Ad Hoc Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[7] Bruce Schneier,et al. Surreptitiously Weakening Cryptographic Systems , 2015, IACR Cryptol. ePrint Arch..
[8] Chang-qing Zhu,et al. GIS Spatial Data Updating Algorithm Based on Digital Watermarking Technology , 2014, GRMSE.
[9] Amor Lazzez,et al. Forensics Investigation of Web Application Security Attacks , 2015 .
[10] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[11] Hsinchun Chen,et al. Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace , 2008, TOIS.
[12] Mamta Juneja,et al. A Novel Approach for Data Hiding in Color Images Using LSB Based Steganography with Improved Capacity and Resistance to Statistical Attacks , 2015 .
[13] Haibin Duan,et al. New progresses in swarm intelligence-based computation , 2015, Int. J. Bio Inspired Comput..
[14] Hossein Bidgoli,et al. Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations (Handbook of Information Security) , 2006 .
[15] Chet Hosmer,et al. Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols , 2012 .