A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES

Esra ŞATIR, Oğuzhan KENDİRLİ
1.950 849

Öz



Anahtar kelimeler


Steganography, data compression, cryptography, DES

Tam metin:

PDF

Referanslar


Huang, H. C., and Fang, W. C., (2010). Techniques and applications of intelligent multimedia data hiding, Telecommunication Systems, 44(3-4):241-251.

Weng, C. Y., Tso, H. K., Wang, S. J., (2012). Steganographic data hiding in image processing using predictive differencing, Opto-Electronics Review, 20(2):126-133. Swain, G., and Lenka, S. K., (2013). Steganography using two sided, three sided, and four sided side match methods, CSI Transactions on ICT, 1(2):127-133.

Cheddad, A., Condell, J., Curran, K., McKevitt, P., (2010). Digital image steganography: Survey and analysis of current methods, Signal Processing, 90(3):727-752.

Satir, E., and Isik, H., (2012). A compression-based text steganography method, Journal of Systems and Software, 85(10): 2385-2394.

Ioannidou, A., Halkidis, S., T., Stephanides, G., (2012). A novel technique for image steganography based on a high payload method and edge detection, Expert Systems with Applications, 39(14): 11517–11524.

Bailey, K., and Curran, K., (2006). An evaluation of image based steganography methods using visual inspection and automated detection techniques, Multimedia Tools and Applications, 31(3):327.

Fu, Y., Zhang, R., Ma, S., Qu, Z., Nıu, X., Yang, Y., (2009). Fast coding in digital steganography, The Journal of China Universities of Posts and Telecommunications, 16(6):92-96. http://www.tr.lipsum.com/feed/html, (Last Accessed: 28.11.2013).