Asian Journal of Information Technology

Year: 2017
Volume: 16
Issue: 9
Page No. 716 - 721

Proposed Multi-Level Security Depended on Steganography and Modified Cryptography

Authors : Fadhil SalmanAbed

References

Anderson, R.J. and F.A. Petitcolas, 1998. On the limits of steganography. IEEE J. Selected Areas Commun., 16: 474-481.
CrossRef  |  Direct Link  |  

Cheng, H.D., X.H. Jiang, Y. Sun and J. Wang, 2001. Color image segmentation: Advances and prospects. Pattern Recognition, 34: 2259-2281.
CrossRef  |  

Fisher, Y., 1995. Fractal Image Compression: Theory and Application. Springer, New York, USA., ISBN:9780387942117, Pages: 341.

Juneja, M. and P.S. Sandhu, 2013. Data hiding with enhanced LSB steganography and cryptography for RGB color images. Proceedings of the 2nd International Conference on Latest Computational Technologies (ICLCT'13), June 17-18, 2013, ICLCT, London, UK., pp: 1-4.

Kaur, S. and S. Kaur, 2017. Fractal image compression using quad tree decomposition and modified huffman coding. Imperial J. Interdiscip. Res., 3: 1332-1336.
Direct Link  |  

Keerthika, S., 2017. Quality images using advanced fractal image compression method. Intl. Adv. Res. J. Sci. Eng. Technol., 4: 90-94.
CrossRef  |  Direct Link  |  

Schettini, R., 1993. A segmentation algorithm for color images. Pattern Recognit. Lett., 14: 499-506.
CrossRef  |  Direct Link  |  

Shanyu, T. and H. Yongfeng, 2011. Prediction of distortion pat-terns in image steganography by means of fractal computing. Proceedings of the 3rd International Conferences on Pervasive Pat-terns and Applications, September 25-30, 2011, International Academy, Research and Industry Association, Rome, Italy, pp: 128-132.

Shereek, B.M., Z. Muda and S. Yasin, 2014. Improve cloud computing security using rsa encryption withfermat's little theorem. IOSR J. Eng., 4: 1-8.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2022 All Rights Reserved