DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Technology Conditional entrench spatial domain steganography

1.Signal & Image Processing : An International Journal (SIPIJ) Vol.5, No.3, June 2014 DOI : 10.5121/sipij.2014.5303 25 CONDITIONAL ENTRENCH SPATIAL DOMAIN STEGANOGRAPHY…

Technology AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION

1. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013 DOI : 10.5121/ijcnc.2013.5414 173 AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO…

Documents Prj3 Report

THE UNIVERSITY OF TENNESSEE ECE 572 Digital Image Processing Project #3 Steganography Implementation Instructor: Dr. Qi Student: Getao Liang December 10, 2005 THE UNIVERSITY…

Documents Ppt Seminar

Seminar on Secured Data Transmission Through Encrypted Images using Lossy Compression Presented by, FATHIMA ROUSHEEN USN: 1ST11IS023 8th Sem B.E. (Information Science) Under…

Documents Efficient and Accurate Nearest Neighbor and Closest Pair Search in High Dimensional Space

Efficient and Accurate Nearest Neighbor and Closest Pair Search in High Dimensional Space YUFEI TAO (Chinese University of Hong Kong) KE YI (Hong Kong University of Science…

Documents Perception of Steganography on .wav Files

Perception of Least Significant Bit Steganography in .wav Audio Files by John Garretson Audio Arts and Acoustics, Columbia College Chicago, 33 East Congress Parkway, Chicago,…

Documents High Capacity Data Embedding using joint Intermediate Significant Bit (ISB) and Least Significant Bi

Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol. 2, No.11, 2012 1 High Capacity Data Embedding using…