Securing Information Using Sterganoraphy
暂无分享,去创建一个
[1] Fawzi M. Al-Naima,et al. A modified high capacity image steganography technique based on wavelet transform , 2010, Int. Arab J. Inf. Technol..
[2] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[3] N. C. Debnath,et al. LCS based text steganography through Indian Languages , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[4] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[5] Ivan W. Selesnick,et al. Wavelet Transforms | A Quick Study , 2007 .
[6] Paresh Marwaha,et al. Visual cryptographic steganography in images , 2010, 2010 Second International conference on Computing, Communication and Networking Technologies.
[7] Mamta Juneja,et al. Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.
[8] Amir-Masoud Eftekhari-Moghadam,et al. Digital Image Steganography Based on Assignment Algorithm and Combination of DCT-IWT , 2012, 2012 Fourth International Conference on Computational Intelligence, Communication Systems and Networks.
[9] Jie Zhang,et al. A Novel Secure Communication Protocol Combining Steganography and Cryptography , 2011 .
[10] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[11] T. Narasimmalou,et al. Optimized discrete wavelet transform based steganography , 2012, 2012 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT).
[12] Chin-Chen Chang,et al. An Adaptive Steganography for Index-Based Images Using Codeword Grouping , 2004, PCM.
[13] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[14] K. Shanthi,et al. Comparative Analysis of Various Median Filters Using Peak Signal TO Noise Ratio (PSNR) , 2014 .
[15] Ajith Abraham,et al. Significance of steganography on data security , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[16] Nyein Aye,et al. A Modified High Capacity Image Steganography using Discrete Wavelet Transform , 2013 .