New Data Hiding Technique in Encrypted Image: DKL Algorithm (Differing Key Length)
暂无分享,去创建一个
[1] D. Artz,et al. Digital steganography: hiding data within data , 2001 .
[2] Nasir D. Memon,et al. Performance study of common image steganography and steganalysis techniques , 2006, J. Electronic Imaging.
[3] Mark Chapman,et al. Hiding the Hidden: A software system for concealing ciphertext as innocuous text , 1997, ICICS.
[4] Eric Cole,et al. Hiding in Plain Sight: Steganography and the Art of Covert Communication , 2003 .
[5] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[6] Daisy Jacobs,et al. Implementation of LSB Steganography and Its Evaluation for Various Bits , 2007, 2006 1st International Conference on Digital Information Management.
[7] Moazzam Hossain,et al. Variable rate Steganography in gray scale digital images using neighborhood pixel information , 2009, 2009 12th International Conference on Computers and Information Technology.
[8] Dipti Kapoor Sarmah,et al. Proposed System for data hiding using Cryptography and Steganography Proposed System for data hiding using Cryptography and Steganography , 2010, ArXiv.
[9] Jan H. P. Eloff,et al. An overview of image steganography , 2005, ISSA.
[10] Manuel Blum,et al. Toward a theory of steganography , 2004 .
[11] Sos S. Agaian,et al. Key Dependent Covert Communication System Using Fibonacci P-Codes , 2007, 2007 IEEE International Conference on System of Systems Engineering.
[12] R. Sridevi,et al. EFFICIENT METHOD OF AUDIO STEGANOGRAPHY BY MODIFIED LSB ALGORITHM AND STRONG ENCRYPTION KEY WITH ENHANCED SECURITY , 2009 .
[13] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.
[14] Anastasios Tefas,et al. A survey on watermarking application scenarios and related attacks , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[15] David Kahn,et al. The History of Steganography , 1996, Information Hiding.
[16] Ross J. Anderson. Stretching the Limits of Steganography , 1996, Information Hiding.