Combination Base64 Algorithm and EOF Technique for Steganography
暂无分享,去创建一个
S Sriadhi | Dahlan Abdullah | Muhammad Ikhsan Setiawan | Ansari Saleh Ahmar | Rahmat Hidayat | Heri Nurdiyanto | Ilham Faisal | Robbi Rahim | Andysah Putera Utama Siahaan | Ahmad Zamsuri | Darmawan Napitupulu | Dodi Siregar | Diana Suita | Sayuti Rahman | R. Rahim | Dahlan Abdullah | M. I. Setiawan | Darmawan Napitupulu | Dodi Siregar | R. Hidayat | S. Sriadhi | H. Nurdiyanto | Ahmad Zamsuri | A. Saleh Ahmar | Andysah Putera Utama Siahaan | Ilham Faisal | Sayuti Rahman | Diana Suita
[1] Mehdi Hussain,et al. A Survey of Image Steganography Techniques , 2013 .
[2] Heri Nurdiyanto,et al. Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement , 2017 .
[3] Robbi Rahim,et al. Cryptography Technique with Modular Multiplication Block Cipher and Playfair Cipher , 2016 .
[4] Wojciech Mazurczyk,et al. Trends in steganography , 2014, Commun. ACM.
[5] Robbi Rahim,et al. Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm , 2016 .
[6] Anu Binny,et al. Hiding Secret Information Using LSB Based Audio Steganography , 2014, 2014 International Conference on Soft Computing and Machine Intelligence.
[7] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[8] Gurpreet Singh,et al. Modified Vigenere Encryption Algorithm and Its Hybrid Implementation with Base64 and AES , 2013, 2013 2nd International Conference on Advanced Computing, Networking and Security.
[9] Nor Ashidi Mat Isa,et al. A Steganography Approach over Video Images to Improve Security , 2015 .
[10] Heri Nurdiyanto,et al. Enhanced pixel value differencing steganography with government standard algorithm , 2017, 2017 3rd International Conference on Science in Information Technology (ICSITech).
[11] Yongzhao Zhan,et al. Base62x: An alternative approach to Base64 for non-alphanumeric characters , 2011, 2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD).
[12] Dolly Virgian Shaka Yudha Sakti Yayuk Anggraini. PENERAPAN STEGANOGRAFI METODE END OF FILE (EOF) DAN ENKRIPSI METODE DATA ENCRYPTION STANDARD (DES) PADA APLIKASI PENGAMANAN DATA GAMBAR BERBASIS JAVA PROGRAMMING , 2014 .