Secure Data Communication Using Random Bit Substitution
Abstract
Keywords
Full Text:
PDFReferences
B Singh and A P Singh. 2008, „Edge Detection in Gray Level Images based on Shannon Entropy‟. Journal of Computer Science vol 4, no 3, pp 186-191.
Chin-Chen Changa, Ju-Yuan Hsiaob and Chi-Shiang Chana. 2003, „Finding Optimal Least-significant-bit Substitution in Image Hiding by Dynamic Programming Strategy‟. Pattern Recognition, vol 36, no 3, pp 1583-1595.
Cheng-HsingYang. 2008, „Inverted Pattern Approach to Improve Image Quality of Information Hiding by LSB Substitution‟. Pattern Recognition, vol 41, no 12, pp 2674-2683.
D C Wu and W H Tsai. 2003, „A Steganographic Method for Images by Pixelvalue Differencing‟. Pattern Recognition Letters, vol 24, nos 9-10, pp 1613-1626.
H M Chao, C M Hsu and S G Miaou. 2002, „A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records‟. IEEE Transactions on Information Technology in Biomedicine, vol 6, no 1, pp 46-53.
Ki Hyun Jung and Kee Young Yoo. 2009, „Data Hiding Method using Image Interpolation‟. Computer Standards and Interfaces, vol 31, pp 465-470.
M D Swanson, B Zu and A H Tewfik. September 1996, „Robust Data Hiding for Images‟. The Seventh Digital Signal Processing Workshop (DSP 96), IEEE, Loen, Norway, pp 37-40.
MATLAB Software. „Calculation of Correlation between Cover Image and Stego Image‟. Version 7.0.
N F Johnson and S Jajodia. February 1998, „Exploring Steganography: Seeing the Unseen‟. IEEE Computer, pp 26-34.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.