B
uscar
R
evistas
T
esis
Acceso usuarios
Acceso de usuarios registrados
Identificarse
¿Olvidó su contraseña?
¿Es nuevo?
Regístrese
Ventajas de registrarse
Ayuda
Ir al conteni
d
o
A Modified RSA Algorithm for Hiding Text in Colored Images with Random Pixel Selection
Autores:
Sinan A. Naji, Hatem N. Mohaisen, Salman H. Omran
Localización:
Opción: Revista de Ciencias Humanas y Sociales
,
ISSN
1012-1587,
Nº. Extra 20, 2019
,
págs.
749-768
Idioma:
inglés
Enlaces
Texto completo (
pdf
)
Referencias bibliográficas
N. Efford, Digital image processing: a practical introduction using java (with CD-ROM): Addison-Wesley Longman Publishing Co., Inc., 2000.
K. Joshi, K. Puniani, and R. Yadav, “A Review on Different Image Steganography Techniques,” Digital Image Processing, vol. 8, no. 6, pp. 179-186,...
M. Mishra, G. Tiwari, and A. K. Yadav, “Secret communica- tion using public key steganography,” in International Conference on Recent Advances...
V. Pachghare, Cryptography and information security: PHI Learning Pvt. Ltd., 2015.
H. L. Hussein, A. A. Abbass, S. A. Naji, S. Al-augby, and J. H. Lafta, “Hiding text in gray image using mapping technique,” in Jour- nal of...
A. Y. Tuama, M. A. Mohamed, A. Muhammed, and M. H. Zurina, “Randomized Pixel Selection for Enhancing LSB Algorithm Security against Brute-Force...
A. Tiwari, S. R. Yadav, and N. Mittal, “A review on different image steganography techniques,” International Journal of Engineer- ing and...
A. Baby, and H. Krishnan, “Combined Strength of Steganog- raphy and Cryptography-A Literature Survey,” International Journal of Advanced Research...
S. Almuhammadi, and A. Al-Shaaby, “A survey on recent ap- proaches combining cryptography and steganography,” Computer Science Information...
G. Swain, and S. K. Lenka, “A novel steganography technique by mapping words with LSB array,” International Journal of Signal and Imaging...
A. H. Al-Hamami, and I. A. Aldariseh, “Enhanced method for RSA cryptosystem algorithm,” in Advanced Computer Science Applications and Technologies...
R. S. Ankit Uppal, Renuka ngapal, Aakash gupta, “Merging Cryptography and Steganography Combination of Cryptography: RC6 Enhanced Ciphering...
S. Saraireh, “A Secure Data Communication system using cryptography and steganography,” International Journal of Comput- er Networks &...
M. E. Saleh, A. A. Aly, and F. A. Omara, “Data Security Using Cryptography and Steganography Techniques,” IJACSA) Interna- tional Journal...
A. A. Pujari;, and S. S. Shinde, “Data Security using Cryptog- raphy and Steganography,” IOSR Journal of Computer Engineering, vol. 18, no....
A. Kumar, and R. Sharma, “A secure image steganography based on RSA algorithm and hash-LSB Technique,” International Journal of Advanced Research...
S. D. M. Satar, N. A. Hamid, F. Ghazali, R. Muda, and M. Mamat, “A New Model for Hiding Text in an Image Using Logical Connective,” International...
A. Dhamija, and V. Dhaka, “A novel cryptographic and ste- ganographic approach for secure cloud data migration,” in 2015 In- ternational Conference...
B. Pillai, M. Mounika, P. J. Rao, and P. Sriram, “Image steg- anography method using k-means clustering and encryption tech- niques,” in 2016...
R. Indrayani, H. A. Nugroho, R. Hidayat, and I. Pratama, “In- creasing the security of mp3 steganography using AES Encryption and MD5 hash...
N. Patel, and S. Meena, “LSB based image steganography us- ing dynamic key cryptography,” in 2016 International Conference on Emerging Trends...
S. Jindal, and N. Kaur, “Digital image steganography survey and analysis of current methods,” International Journal of Computer Science and...
K. U. Singh, “A Survey on Image Steganography Techniques,” International Journal of Computer Applications, vol. 97, no. 18, 2014. [26] B....
A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Sig- nal processing,...
D. Lehmer, “Proceedings of the Second Symposium on Large-Scale Digital Computing Machinery,” Harvard University Press, Cambridge, Mass, 1951.
R. Zainuddin, S. Naji, and J. Al-Jaafar, “Suppressing False Negatives in Skin Segmentation,” in International Conference on Fu- ture Generation...
J. Rani, and T. A. Khan, “Performance Optimized DCT Do- main Watermarking Technique with JPEG,” International Journal of innovative Technology...
K. Rao, and H. Wu, “Structural similarity based image quality assessment,” Digital Video image quality and perceptual coding, pp. 261-278:...
Opciones
Mi Ágora
S
elección
Opciones de artículo
Seleccionado
Opciones de compartir
Facebook
Twitter
Opciones de entorno
Sugerencia / Errata
©
2024
INAP
- Todos los derechos reservados
Ayuda
Accesibilidad
Aviso Legal
¿En qué podemos ayudarle?
×
Buscar en la ayuda
Buscar