Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 11 SI
Page No. 9176 - 9181

An Efficient Methods for Hiding Secure Image in Image

Authors : Baheeja Khudair Shukur and Hussein Ali Hussein

References

Al-Shatanawi, O.M. and N.N. El-Emam, 2015. A new image steganography algorithm based on Mlsb method with random pixels selection. Intl. J. Network Secur. Appl., 7: 37-53.
Direct Link  |  

El-Emam, N.N. and R.A.S. Al-Zubidy, 2013. New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm. J. Syst. Software, 86: 1465-1481.
Direct Link  |  

Jassim, F. and H. Qassim, 2012. Five modules method for image compression. Signal Image Process. Intl. J., 3: 19-28.
CrossRef  |  Direct Link  |  

Kahate, A., 2008. Cryptography and Network Security. 2nd Edn., McGraw-Hill Education, New York, USA.,.

Pennebaker, W. and J. Mitchell, 1993. Still Image Compression Standard. Van Nostrand, New York, USA.,.

Petkovic, M. and W.P. Jonker, 2009. Special issue on secure data management. J. Comput. Secur., 17: 1-3.

Todd, R.R., 2005. Digital Image Sequence Processing, Compression and Analysis. Taylor & Francis, Milton Park, Didcot, UK., ISBN:9780849315268, Pages: 272.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved