International Journal of Soft Computing

Year: 2017
Volume: 12
Issue: 1
Page No. 20 - 25

References

Agarwal, M., 2013. Text steganographic approaches: A comparison. Intl. J. Network Secur. Appl., 5: 91-106.
CrossRef  |  Direct Link  |  

Banerjee, I., S. Bhattacharyya and G. Sanyal, 2012. A procedure of text steganography using indian regional language. Intl. J. Comput. Network Inf. Secur., 4: 65-73.
Direct Link  |  

Bender, W., D. Gruhl, N. Morimoto and A. Lu, 1996. Techniques for data hiding. IBM Syst. J., 35: 313-336.
CrossRef  |  Direct Link  |  

Bennett, K., 2004. Linguistic steganography: Survey, analysis and robustness concerns for hiding information in text. CERIAS Technical Report, Purdue University, West Lafayette, IN 47907-2086. https://www.cerias.purdue.edu/assets/pdf/bibtex_archive/2004-13.pdf.

Challita, K. and H. Farhat, 2011. Combining steganography and cryptography: New directions. Int. J. New Comput. Archit. Appl., 1: 199-208.
Direct Link  |  

Cummins, J., P. Diskin, S. Lau and R. Parlett, 2004. Steganography and digital watermarking. MSc Thesis, University of Birmingham, Birmingham, England.

Gupta, S., A. Goyal and B. Bhushan, 2012. Information hiding using least significant bit steganography and cryptography. Intl. J. Mod. Educ. Comput. Sci., 4: 27-34.
Direct Link  |  

Juneja, M. and P.S. Sandhu, 2013. An improved LSB based Steganography with enhanced security and embedding/extraction. Proceedings of the 3rd International Conference on Intelligent Computational Systems, January 26-27, 2013, Hong Kong, China, pp: 29-34.

Kaur, J. and J. Kaur, 2016. Hiding text in video using steganographic technique a review. Intl. J. Eng. Sci., 17: 578-582.
Direct Link  |  

Khairullah, M., 2011. A novel text steganography system in cricket match scorecard. Intl. J. Comput. Appl., 21: 43-47.
Direct Link  |  

Manimozhi, K., V. Kalaichelvi, M. Poornima and A. Sumathi, 2015. An approach for text steganography: Generating tamil text summary using tamil phonetics. Intl. Rev. Comput. Software, 10: 137-143.
Direct Link  |  

Prashanti, G., K.S. Rani and S. Deepthi, 2013. LSB and MSB based steganography for embedding modified des encrypted text. Intl. J. Adv. Res. Comput. Sci. Software Eng., 3: 788-799.

Purnama, B. and A.H. Rohayani, 2015. A new modified caesar cipher cryptography method with legibleciphertext from a message to be encrypted. Procedia Comput. Sci., 59: 195-204.
Direct Link  |  

Shirali, S.M.H. and M.S. Shahreza, 2008. A new synonym text steganography. Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP'08), August 15-17, 2008, IEEE, Yazd, Iran, ISBN:978-0-7695-3278-3, pp: 1524-1526.

Tech, H.S.M., 2013. Analysis and implementation of algorithm to hide secret message. Intl. J. Adv. Res. Comput. Sci. Software Eng., 3: 327-333.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved