-
1
-
-
44949249676
-
Hiding a large Amount of data with High Security Using Steganography Algorithm
-
Nameer N. EL-Emam, Hiding a large Amount of data with High Security Using Steganography Algorithm Journal of Computer Science ISSN 1549-3636, vol.3, no. 4, pp. 223-232, 2007.
-
(2007)
Journal of Computer Science ISSN 1549-3636
, vol.3
, Issue.4
, pp. 223-232
-
-
El-Emam, N.N.1
-
2
-
-
42749099027
-
Statistically secure digital image data hiding
-
Shanghai, China, Oct.
-
P. Amin, N. Lue and K. Subbalakshmi, Statistically secure digital image data hiding," IEEE Multimedia Signal Processing MMSP05, pp. 1-4, Shanghai, China, Oct. 2005.
-
(2005)
IEEE Multimedia Signal Processing MMSP05
, pp. 1-4
-
-
Amin, P.1
Lue, N.2
Subbalakshmi, K.3
-
3
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
May
-
B. Chen and G. W. Wornnel, Quantization index modulation: A class of provably good methods for digital watermarking and information embedding IEEE Trans. On Info. Theory, vol.47, no. 4, pp. 1423-1443, May 2001.
-
(2001)
IEEE Trans. On Info. Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornnel, G.W.2
-
4
-
-
0035167458
-
Analysis of LSB based image steganography techniques
-
Thissaloniki Greece
-
R. Chandramouli and N. Memon, Analysis of LSB based image steganography techniques Proc. of ICIP, Thissaloniki, pp. 1019- 1022, Greece, 2001.
-
(2001)
Proc. of ICIP
, pp. 1019-1022
-
-
Chandramouli, R.1
Memon, N.2
-
5
-
-
0032223822
-
A robust image authentication method surviving JPEG lossy compression
-
San Jose
-
C.Y. Lin and S. F. Chang, A robust image authentication method surviving JPEG lossy compression Proc. SPIE, vol.3312, San Jose, pp. 296-307, Jan. 1998.
-
(1998)
Proc. SPIE
, vol.3312
, pp. 296-307
-
-
Lin, C.Y.1
Chang, S.F.2
-
6
-
-
35248901820
-
Detection of LSB steganography via sample pair analysis
-
Springer-Verlag, New York
-
S. Dumitrescu, W. Xiaolin and Z. Wang, Detection of LSB steganography via sample pair analysis In: LNCS, vol.2578, Springer-Verlag, New York, pp. 355-372, 2003.
-
(2003)
In: LNCS
, vol.2578
, pp. 355-372
-
-
Dumitrescu, S.1
Xiaolin, W.2
Wang, Z.3
-
7
-
-
0037353686
-
Information-theoretic analysis of information Hiding
-
March
-
P. Moulin and J. A. O'Sullivan, Information-theoretic analysis of information Hiding IEEE Trans. On Info. Theory, vol.49, no. 3, pp. 563-593, March 2003.
-
(2003)
IEEE Trans. On Info. Theory
, vol.49
, Issue.3
, pp. 563-593
-
-
Moulin, P.1
O'Sullivan, J.A.2
-
8
-
-
30844471653
-
Multivariate entropy detector based hybrid image registration algorithm
-
Philadelphia, Pennsylvania, USA
-
S. Pavan, S. Gangadharpalli and V. Sridhar, Multivariate entropy detector based hybrid image registration algorithm IEEE Int. Conf. on Acoustics, Speech and Signal Processing, Philadelphia, Pennsylvania, USA, pp. 18-23, March 2005.
-
(2005)
IEEE Int. Conf. on Acoustics, Speech and Signal Processing
, pp. 18-23
-
-
Pavan, S.1
Gangadharpalli, S.2
Sridhar, V.3
-
9
-
-
3042643368
-
Steganographic schemes for file system and B-tree
-
H. H. Pang, K. L. Tan and X. Zhou, Steganographic schemes for file system and B-tree," IEEE Trans. On Knowledge and Data Engineering, vol.16, pp. 701-713, Singapore, June 2004.
-
(2004)
IEEE Trans. On Knowledge and Data Engineering
, vol.16
, pp. 701-713
-
-
Pang, H.H.1
Tan, K.L.2
Zhou, X.3
-
10
-
-
0036709581
-
A framework for evaluating the data-hiding capacity of image sources
-
DOI 10.1109/TIP.2002.802512, PII 1011092002802512
-
P. Moulin and M. K. Mihcak, A framework for evaluating the data-hiding capacity of image sources IEEE Transactions on Image Processing, vol.11, pp. 1029-1042, Urbana, Illinois, Sept. 2002. (Pubitemid 35250386)
-
(2002)
IEEE Transactions on Image Processing
, vol.11
, Issue.9
, pp. 1029-1042
-
-
Moulin, P.1
Mihcak, M.K.2
-
11
-
-
33144461692
-
The NIST cryptographic workshop on hash functions
-
C. Rechberger, V. Rijman and N. Sklavos, The NIST cryptographic Workshop on Hash Functions IEEE Security & Privacy, vol.4, pp. 54-56, Austria, Jan-Feb 2006. (Pubitemid 43269813)
-
(2006)
IEEE Security and Privacy
, vol.4
, Issue.1
, pp. 54-56
-
-
Rechberger, C.1
Rijmen, V.2
Sklavos, N.3
-
12
-
-
66249095780
-
A New approach for authentication technique
-
ISSN 1549-3636
-
A. H. Al-Hamami and S. A. Al-Ani A New Approach for Authentication Technique", Journal of computer Science, ISSN 1549-3636, Vol.l,No. l,pp. 103-106,2005.
-
(2005)
Journal of computer Science
, vol.1
, Issue.1
, pp. 103-106
-
-
Al-Hamami, A.H.1
Al-Ani, S.A.2
|