An Efficient, High Secure Steganography Algorithm
Abstract
Keywords
Full Text:
PDFReferences
Nameer N. EL-Emam (2007), ‘Hiding a Large Amount of Data with High Security Using Steganography Algorithm’, Journal of Computer Science 3 (4): 223-232, 2007, Philadelphia University, Jordan
Chandramouli, R. and N. Memon, 2001. Analysis of LSB based image steganography techniques. Proc. of ICIP, Thessaloniki, Greece.
Dumitrescu, S., W. Xiaolin and Z. Wang, 2003.Detection of LSB steganography via sample pair analysis. In: LNCS, Vol. 2578, Springer-Verlag, New York, pp: 355–372.
Ahn, L.V. and N.J. Hopper, 2004. Public-key steganography. In Lecture Notes in Computer Science. Vol. 3027 / 2004 of Advances in Cryptology - EUROCRYPT 2004, pp: 323–341.Springer-Verlag Heidelberg.
Pang, H.H., K.L. Tan and X. Zhou, 2004.Steganographic schemes for file system and b-tree. IEEE Trans. on Knowledge and Data Engineering, 16: 701–713.
Dobsicek, M., 2004. Extended steganographic system. In: 8th Intl. Student Conf. on Electrical Engineering. FEE CTU.
Mittal, U. and N. Phamdo, 2002. Hybrid digital analog joint source-channel codes for broadcasting and robust communications. IEEE Trrans. on Info. Theory, 48: 1082 –1102.
Pavan, S., S. Gangadharpalli and V. Sridhar, 2005.Multivariate entropy detector based hybrid image registration algorithm. IEEE Intl. Conf. on Acoustics, Speech and Signal Processing, pp: 18-23.
Moulin, P. and J.A. O’Sullivan, 2003. Information theoretic analysis of information hiding. IEEE Trans. on Info. Theory, 49: 563–593.
Amin, P., N. Liu and K. Subbalakshmi, 2005. Statistically secure digital image data hiding. IEEE Multimedia Signal Processing MMSP05, China.
Jackson, J., G. Gunsch, R. Claypoole and G. Lamont, 2004. Detecting novel steganography with an anomaly- based strategy. J. Electr. Imag., 13:860– 870.
S-Tools (http:// digitalforensics. champlain. edu/download/s-tools 4.zip).
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.