Secured File Management System using Stegnography
Abstract
Keywords
Full Text:
PDFReferences
A Java Stegnography Tool,Kathryn Hempstalk March 24, 2005,Supervisor: Eibe Frank.
Neil F. Johnson,Sushil Jajodia George Mason University, February 1998 27
Stegnography FAQ, Aelphaeis Mangarae [Zone-H.Org] March 18th 2006, Copyright Zone-H.Org 2006
cs171, Introduction to Programming, Final Project: Stegnography Application.
T. Aura, “Invisible Communication,” EET 1995, technical report, Helsinki Univ. of Technology, Finland, Nov. 1995
A. Brown, S-Tools for Windows, 1994, ftp://idea.sec. dsi.unimi.it/pub/security/crypt/code/s-tools3.zip.
C. Kurak and J. McHugh, “A Cautionary Note On Image Downgrading,” Proc. IEEE Eighth Ann. Computer ,Security Applications Conf., IEEE Press, Piscataway, N.J., 1992, pp. 153-159.
W. Bender et al., “Techniques for Data Hiding,” IBM Systems J., Vol. 35, Nos. 3 and 4, 1996, pp. 313-336.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.