Fast real-time hardware engine for Multipoint Text Steganography
暂无分享,去创建一个
[1] Lee-Ming Cheng,et al. Hardware Realization of Steganographic Techniques , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[2] Jan H. P. Eloff,et al. An overview of image steganography , 2005, ISSA.
[3] M. Saeb,et al. DESIGN AND IMPLEMENTATION OF A SECRET KEY STEGANOGRAPHIC MICROARCHITECTURE EMPLOYING FPGA , 2003 .
[4] Magdy Saeb,et al. Design and implementation of a secret key steganographic micro-architecture employing FPGA , 2004 .
[5] Abdulaleem Z. Al-Othmani,et al. A survey on steganography techniques in real time audio signals and evaluation , 2012 .
[6] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[7] Jessica J. Fridrich,et al. Perturbed quantization steganography , 2005, Multimedia Systems.
[8] Pradeep Kumar Singh,et al. A Survey on Text Based Steganography , 2009 .
[9] Anupama,et al. INFORMATION HIDING USING AUDIO STEGANOGRAPHY - A SURVEY , 2011 .
[10] Mohammad Hassan Shirali-Shahreza,et al. A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).
[11] Ismail Avcibas,et al. Steganalytic Features for JPEG Compression-Based Perturbed Quantization , 2007, IEEE Signal Processing Letters.
[12] K. Elleithy,et al. Steganography by multipoint Arabic letters , 2012, 2012 IEEE Long Island Systems, Applications and Technology Conference (LISAT).
[13] B. J. Mohd,et al. FPGA hardware of the LSB steganography method , 2012, 2012 International Conference on Computer, Information and Telecommunication Systems (CITS).
[14] S. Katzenbeisser,et al. A survey of steganographic techniques , .
[15] Elizabeth Chang,et al. Visibly Invisible: Ciphertext as a Steganographic Carrier , 2004 .
[16] Claudia Feregrino Uribe,et al. FPGA Hardware Architecture of the Steganographic ConText Technique , 2008, 18th International Conference on Electronics, Communications and Computers (conielecomp 2008).
[17] Ahlam Fadhil Mahmood,et al. An FPGA Implementation of Secured Steganography Communication System , 2014 .
[18] Jawdat K. Al-Tirkity,et al. Bearing Capacity of Eccentrically Loaded Strip Footing on Geogrid Reinforced Sand , 2012 .