1. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013 DOI : 10.5121/ijcnc.2013.5414 173 AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO…
THE UNIVERSITY OF TENNESSEE ECE 572 Digital Image Processing Project #3 Steganography Implementation Instructor: Dr. Qi Student: Getao Liang December 10, 2005 THE UNIVERSITY…
Seminar on Secured Data Transmission Through Encrypted Images using Lossy Compression Presented by, FATHIMA ROUSHEEN USN: 1ST11IS023 8th Sem B.E. (Information Science) Under…
Efficient and Accurate Nearest Neighbor and Closest Pair Search in High Dimensional Space YUFEI TAO (Chinese University of Hong Kong) KE YI (Hong Kong University of Science…
Perception of Least Significant Bit Steganography in .wav Audio Files by John Garretson Audio Arts and Acoustics, Columbia College Chicago, 33 East Congress Parkway, Chicago,…
Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol. 2, No.11, 2012 1 High Capacity Data Embedding using…