메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1103-1108

Image authentication by hiding large volume of data and secure message transmission technique using mask (IAHLVDSMTTM)

Author keywords

Authentication; Image authentication by hiding large volume of data and secure message transmission technique using mask (IAHLVDSMTTM); Mask; Message digest key; S tools; Steganography

Indexed keywords

COLOR IMAGES; EMBEDDED IMAGES; HISTOGRAM ANALYSIS; IMAGE AUTHENTICATION; IMAGE AUTHENTICATION BY HIDING LARGE VOLUME OF DATA AND SECURE MESSAGE TRANSMISSION TECHNIQUE USING MASK (IAHLVDSMTTM); IMAGE BLOCKS; MESSAGE DIGEST KEY; MESSAGE TRANSMISSIONS; NOISE ANALYSIS; S-TOOLS; SECURE MESSAGE TRANSMISSION; SOURCE IMAGES; STANDARD DEVIATION; STEGANOGRAPHIC ALGORITHMS; STEGANOGRAPHY; XOR OPERATION;

EID: 66249096327     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IADCC.2009.4809168     Document Type: Conference Paper
Times cited : (10)

References (12)
  • 1
    • 44949249676 scopus 로고    scopus 로고
    • Hiding a large Amount of data with High Security Using Steganography Algorithm
    • Nameer N. EL-Emam, Hiding a large Amount of data with High Security Using Steganography Algorithm Journal of Computer Science ISSN 1549-3636, vol.3, no. 4, pp. 223-232, 2007.
    • (2007) Journal of Computer Science ISSN 1549-3636 , vol.3 , Issue.4 , pp. 223-232
    • El-Emam, N.N.1
  • 3
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • May
    • B. Chen and G. W. Wornnel, Quantization index modulation: A class of provably good methods for digital watermarking and information embedding IEEE Trans. On Info. Theory, vol.47, no. 4, pp. 1423-1443, May 2001.
    • (2001) IEEE Trans. On Info. Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornnel, G.W.2
  • 4
    • 0035167458 scopus 로고    scopus 로고
    • Analysis of LSB based image steganography techniques
    • Thissaloniki Greece
    • R. Chandramouli and N. Memon, Analysis of LSB based image steganography techniques Proc. of ICIP, Thissaloniki, pp. 1019- 1022, Greece, 2001.
    • (2001) Proc. of ICIP , pp. 1019-1022
    • Chandramouli, R.1    Memon, N.2
  • 5
    • 0032223822 scopus 로고    scopus 로고
    • A robust image authentication method surviving JPEG lossy compression
    • San Jose
    • C.Y. Lin and S. F. Chang, A robust image authentication method surviving JPEG lossy compression Proc. SPIE, vol.3312, San Jose, pp. 296-307, Jan. 1998.
    • (1998) Proc. SPIE , vol.3312 , pp. 296-307
    • Lin, C.Y.1    Chang, S.F.2
  • 6
    • 35248901820 scopus 로고    scopus 로고
    • Detection of LSB steganography via sample pair analysis
    • Springer-Verlag, New York
    • S. Dumitrescu, W. Xiaolin and Z. Wang, Detection of LSB steganography via sample pair analysis In: LNCS, vol.2578, Springer-Verlag, New York, pp. 355-372, 2003.
    • (2003) In: LNCS , vol.2578 , pp. 355-372
    • Dumitrescu, S.1    Xiaolin, W.2    Wang, Z.3
  • 7
    • 0037353686 scopus 로고    scopus 로고
    • Information-theoretic analysis of information Hiding
    • March
    • P. Moulin and J. A. O'Sullivan, Information-theoretic analysis of information Hiding IEEE Trans. On Info. Theory, vol.49, no. 3, pp. 563-593, March 2003.
    • (2003) IEEE Trans. On Info. Theory , vol.49 , Issue.3 , pp. 563-593
    • Moulin, P.1    O'Sullivan, J.A.2
  • 10
    • 0036709581 scopus 로고    scopus 로고
    • A framework for evaluating the data-hiding capacity of image sources
    • DOI 10.1109/TIP.2002.802512, PII 1011092002802512
    • P. Moulin and M. K. Mihcak, A framework for evaluating the data-hiding capacity of image sources IEEE Transactions on Image Processing, vol.11, pp. 1029-1042, Urbana, Illinois, Sept. 2002. (Pubitemid 35250386)
    • (2002) IEEE Transactions on Image Processing , vol.11 , Issue.9 , pp. 1029-1042
    • Moulin, P.1    Mihcak, M.K.2
  • 11
    • 33144461692 scopus 로고    scopus 로고
    • The NIST cryptographic workshop on hash functions
    • C. Rechberger, V. Rijman and N. Sklavos, The NIST cryptographic Workshop on Hash Functions IEEE Security & Privacy, vol.4, pp. 54-56, Austria, Jan-Feb 2006. (Pubitemid 43269813)
    • (2006) IEEE Security and Privacy , vol.4 , Issue.1 , pp. 54-56
    • Rechberger, C.1    Rijmen, V.2    Sklavos, N.3
  • 12
    • 66249095780 scopus 로고    scopus 로고
    • A New approach for authentication technique
    • ISSN 1549-3636
    • A. H. Al-Hamami and S. A. Al-Ani A New Approach for Authentication Technique", Journal of computer Science, ISSN 1549-3636, Vol.l,No. l,pp. 103-106,2005.
    • (2005) Journal of computer Science , vol.1 , Issue.1 , pp. 103-106
    • Al-Hamami, A.H.1    Al-Ani, S.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.