Analysis of Affine and Hill Cipher Method using Audio Steganography
暂无分享,去创建一个
[1] Kamred Udham Singh,et al. A Survey on Audio Steganography Approaches , 2014 .
[2] Abikoye OluwakemiC.,et al. Efficient Data Hiding System using Cryptography and Steganography , 2012 .
[3] L. DoraM.Ballesteros,et al. Highly transparent steganography model of speech signals using Efficient Wavelet Masking , 2012, Expert Syst. Appl..
[4] Wei Zeng,et al. A Novel Steganalysis Algorithm of Phase Coding in Audio Signal , 2007, Sixth International Conference on Advanced Language Processing and Web Information Technology (ALPIT 2007).
[5] Ali Al-Haj,et al. DWT-based audio watermarking , 2011, Int. Arab J. Inf. Technol..
[6] G. Aghila,et al. Robust Audio steganography based on Advanced Encryption standards in temporal domain , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[7] Tapio Seppänen,et al. Increasing robustness of LSB audio steganography using a novel embedding method , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[8] Samir Kumar Bandyopadhyay,et al. Robust high capacity audio steganography using modulo operator , 2015, Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT).
[9] Anirban Bhowmick,et al. Encrypted Information Hiding using Audio Steganography and Audio Cryptography , 2015 .
[10] Vipul Sharma,et al. LSB modification based Audio Steganography using Trusted Third Party Key Indexing method , 2015, 2015 Third International Conference on Image Information Processing (ICIIP).
[11] Abdullah Gani. Novel approach for high (secure and rate) data hidden within triplex space for executable file , 2010 .
[12] Christian Fabian,et al. Secure Hybrid Spread Spectrum System for Steganography in Auditive Media , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[13] Debnath Bhattacharyya,et al. A GA based audio steganography with enhanced security , 2013, Telecommun. Syst..
[14] Saroj Kumar Panigrahy,et al. Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm , 2007 .
[15] Tanmaiy G. Verma,et al. A Unique Approach for Data Hiding Using Audio Steganography , 2013 .
[16] Tanmay Bhowmik,et al. On Embedding of Text in Audio A Case of Steganography , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.
[17] Jinshu Su,et al. Adaptive VoIP Steganography for Information Hiding within Network Audio Streams , 2011, 2011 14th International Conference on Network-Based Information Systems.
[18] Abdulaleem Z. Al-Othmani,et al. A survey on steganography techniques in real time audio signals and evaluation , 2012 .
[19] A. A. Zaidan,et al. A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm , 2010 .
[20] Mohammed M. Nasef,et al. An Efficient Method to Audio Steganography based on Modification of Least Significant Bit Technique using Random Keys , 2015 .
[21] D. Artz,et al. Digital steganography: hiding data within data , 2001 .
[22] Tarun Khanna,et al. Audio Steganography Using DES Algorithm , 2011 .
[23] M. Asad,et al. Three layered model for audio steganography , 2012, 2012 International Conference on Emerging Technologies.
[24] Sajad Shirali-Shahreza,et al. Steganography in Silence Intervals of Speech , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[25] Asha Ambhaikar,et al. Steganography using RPrime RSA and GA Based LSB Algorithm to Enhance Security , 2012 .
[26] Akram M. Zeki,et al. Robust audio steganography via genetic algorithm , 2009, 2009 International Conference on Information and Communication Technologies.
[27] Kaliappan Gopalan. Audio steganography by cepstrum modification , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[28] K. Gopalan,et al. STEGANOGRAPHY FOR COVERT DATA TRANSMISSION BY IMPERCEPTIBLE TONE INSERTION , 2004 .
[29] Shafakhatullah Khan,et al. An Optimized Method for Concealing Data using Audio Steganography , 2011 .
[30] Navneet Kaur,et al. Audio Steganography Using LSB Edge Detection Algorithm , 2014 .
[31] Sangita Roy,et al. A novel approach to format based text steganography , 2011, ICCCS '11.