Modified and Highly Enhanced Matrix Approach Method of Steganography
Abstract
Keywords
Full Text:
PDFReferences
Y. Chen, H. Pan, and Y. Tseng, “A secure Data Hiding Scheme for Two-Color Images,” IEEE Symposium on Computers and Communications, 2000.
C. Cachin,”An Information-Theoritic Model for Steganography”, Proc. of the 2nd International Workshop on Information Hiding, Portland, Oregon, USA, 15-17 Apr 1998, Lecture notes in CS, Vol.1525, Springer-Verlag.
N. Johnson and S. Jajodia, “Exploring steganography: seeing the unseen,” IEEE Computer, pp. 26-34, February 1998.
R. Chandramouli and Nasir Memon, "Analysis of LSB Based Image Steganography Techniques",2001 International Conference on Image Processing, October 7-10, 2001, Thessaloniki, Greece, Vol. 3, pp. 1019-1022.
1. Johnson, N. F. and Jajodia, S. (1998). Exploring steganography: Seeing the unseen. Computer, 31(2):26–34.
C.T.Hsu and J.L.Wu.,”Hidden Signatures in Images”, Proc. IEEE International Conf. on Image Processing, ICIP-96, Vol.3, pp.223-226.
Niels-Provos, Peter Honeyman, Hide and Seek: Introduction to steganography (2003).
K. Curran and K. Bailey, "An Evaluation of Image Based Steganography Methods," International Journal of Digital Evidence, vol. 2, issue 2, pp. 1-40, Fall 2003.
Luis von Ahn, Nicholas J. Hopper., Public Key Steganography.
Robert Krenn. Steganography and steganalysis.
G Sahoo, R K Tiwari “Designing an Embedded Algorithms for Data Hiding using Steganographic Technique by File Hybridization” , IJCSNS, vol 8, No 1,pp-226-233, January 2008
Ahmed Al-Jaber, Khair Eddin Sabri “Data Hiding in a Binary Image”
Nirmalya Chowdhury, Puspitha Manna “An Efficient Method of Steganography using Matrix Approach”
James C. Judge “Steganography: past, present, future”, GSEC Version 1.2f
Gajendra Singh Chandel, Ravindra Gupta, Swati Jain“Proposed Model of dynamic encryption using Steganography”, IJETAE, vol 2, issue 9, 2012.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.