A NOVEL APPROACHES TOWARDS
暂无分享,去创建一个
[1] R. Zavaleta,et al. Dynamic Steganography Adds Additional Data Security , 2004, IEEE SoutheastCon, 2004. Proceedings..
[2] Xiaolin Wu,et al. A new framework of LSB steganalysis of digital media , 2005, IEEE Transactions on Signal Processing.
[3] Bijoy Bandyopadhyay,et al. Steganography and Steganalysis: Different Approaches , 2011, ArXiv.
[4] A. K. Saxena,et al. Improvisation of Security Aspect in Steganography Applying DES , 2013, 2013 International Conference on Communication Systems and Network Technologies.
[5] Garima Tomar,et al. Effect of Noise on image steganography based on LSB insertion and RSA encryption , 2012 .
[6] Li Zhi,et al. Detection of random LSB image steganography , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[7] Tao Zhang,et al. Detection of LSB Steganography based on Image Smoothness , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[8] Ali N. Akansu,et al. Capacity estimates for data hiding in compressed images , 2001, IEEE Trans. Image Process..
[9] Shailender Gupta,et al. Information Hiding Using Least Significant Bit Steganography and Cryptography , 2012 .
[10] S. Han,et al. Fingerprinted secret sharing steganography for robustness against image cropping attacks , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..
[11] Nasir D. Memon,et al. Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[12] K.B. Raja,et al. A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.
[13] B. S. Manjunath,et al. Data hiding in video , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[14] S. P. Bansod,et al. Modified BPCS steganography using Hybrid cryptography for improving data embedding capacity , 2012, 2012 International Conference on Communication, Information & Computing Technology (ICCICT).
[15] V. Thakur,et al. Hiding secret image in video , 2013, 2013 International Conference on Intelligent Systems and Signal Processing (ISSP).
[16] Kaustubh Choudhary. Properties of Images in LSB Plane , 2012 .
[17] Niels Provos,et al. Detecting Steganographic Content on the Internet , 2002, NDSS.
[18] Chin-Chen Chang,et al. An effective image steganographic scheme based on wavelet transformation and pattern-based modification , 2003, 2003 International Conference on Computer Networks and Mobile Computing, 2003. ICCNMC 2003..
[19] Daisy Jacobs,et al. Implementation of LSB Steganography and Its Evaluation for Various Bits , 2007, 2006 1st International Conference on Digital Information Management.
[20] Ajith Abraham,et al. Significance of steganography on data security , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[21] S. Goel,et al. Comparison of Image Steganography Techniques , 2013 .
[22] Hassan Barada,et al. A testbed for evaluating security and robustness of steganography techniques , 2003, 2003 46th Midwest Symposium on Circuits and Systems.
[23] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[24] Dhananjay Kulkarni,et al. A Steganography-based framework to prevent active attacks during user authentication , 2013, 2013 8th International Conference on Computer Science & Education.
[25] Ahmed H. Tewfik,et al. Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.
[26] Chun-Shien Lu. Dual security-based image steganography , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[27] Yu-Chee Tseng,et al. A secure data hiding scheme for two-color images , 2000, Proceedings ISCC 2000. Fifth IEEE Symposium on Computers and Communications.
[28] Nitin Jain,et al. Image Steganography Using LSB and Edge - Detection Technique , 2012 .
[29] Mohammad Shirali-Shahreza. Improving Mobile Banking Security Using Steganography , 2007, Fourth International Conference on Information Technology (ITNG'07).
[30] Rosziati Ibrahim,et al. Steganography Algorithm to Hide Secret Message inside an Image , 2011, ArXiv.
[31] Sukumar Nandi,et al. Online Voting System Powered by Biometric Security Using Steganography , 2011, 2011 Second International Conference on Emerging Applications of Information Technology.
[32] Lisa M. Marvel,et al. A methodology for data hiding using images , 1998, IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201).
[33] Li Xia,et al. Enhancing iris-feature security with steganography , 2010, 2010 5th IEEE Conference on Industrial Electronics and Applications.
[34] Vikas Tyagi,et al. IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT WITH CRYPTOGRAPHY , 2012 .