Asian Journal of Information Technology
716 - 721
Proposed Multi-Level Security Depended on Steganography and
Anderson, R.J. and F.A. Petitcolas, 1998. On the limits of steganography. IEEE J. Selected Areas Commun., 16: 474-481.CrossRef | Direct Link |
Cheng, H.D., X.H. Jiang, Y. Sun and J. Wang, 2001. Color image segmentation: Advances and prospects. Pattern Recognition, 34: 2259-2281.CrossRef |
Fisher, Y., 1995. Fractal Image Compression: Theory and Application. Springer, New York, USA., ISBN:9780387942117, Pages: 341.
Juneja, M. and P.S. Sandhu, 2013. Data hiding with enhanced LSB steganography and cryptography for RGB color images. Proceedings of the 2nd International Conference on Latest Computational Technologies (ICLCT'13), June 17-18, 2013, ICLCT, London, UK., pp: 1-4.
Kaur, S. and S. Kaur, 2017. Fractal image compression using quad tree decomposition and modified huffman coding. Imperial J. Interdiscip. Res., 3: 1332-1336.Direct Link |
Keerthika, S., 2017. Quality images using advanced fractal image compression method. Intl. Adv. Res. J. Sci. Eng. Technol., 4: 90-94.CrossRef | Direct Link |
Schettini, R., 1993. A segmentation algorithm for color images. Pattern Recognit. Lett., 14: 499-506.CrossRef | Direct Link |
Shanyu, T. and H. Yongfeng, 2011. Prediction of distortion pat-terns in image steganography by means of fractal computing. Proceedings of the 3rd International Conferences on Pervasive Pat-terns and Applications, September 25-30, 2011, International Academy, Research and Industry Association, Rome, Italy, pp: 128-132.
Shereek, B.M., Z. Muda and S. Yasin, 2014. Improve cloud computing security using rsa encryption withfermat's little theorem. IOSR J. Eng., 4: 1-8.Direct Link |