Data Hiding Using Watermarking and Steganography Using Image Processing
Abstract
Full Text:
PDFReferences
Mehdi Kharrazi, Husrev T. Sencar and Nasir Memon “Image Steganography: Conceptsand Practices “Polytechnic University, Brooklyn, NY 11201, USA
Adel AL Mohammad “Steganography-Based Secret and Reliable Communications: Improving Steganographic Capacity and Imperceptibility” A thesis submitted for the degree of Doctor of Philosophy, Department of Information Systems and Computing , Brunel University, August, 2010
R. Popa, An Analysis of Steganographic Techniques, The "Politehnica" University of Timisoara, Faculty of Automatics and Computers, Department of Computer Science and Software Engineering, (http://ad.informatik.unifreiburg.de/mitarbeiter/will/dlib_bo
okmarks/digital-atermarking/popa/popa.pdf, 1998)
Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn “Information Hiding A Survey”Proceedings of the IEEE, special issue on protection of multimedia content, 87(7):1062{1078, July 1999.
Angela D. Orebaugh “Steganalysis: A Steganography Intrusion Detection System” , George Mason University
Lisa M. Marvel “Image Steganography for Hidden Communication” A Dissertation submitted to the Faculty of the University of Delaware in partial fulfillment
Refbacks
- There are currently no refbacks.