Secure Data Transfer on Color Flower Image Using AES, GA and LSB
Abstract
Keywords
References
Mehdi Hussain and MureedHussain, “ A Survey of Image Steganography Techniques”. International Journal of Advanced Science and Technology 2013
JatinderKaur, Ira Gabba, “Steganography Using RSA Algorithm”. (IJITEE) 2013
Handel, T. &Sandford, M., Hiding data in the OSI network model, Proceedings of the 1st International Workshop on Information Hiding, June (1996).
N. Johnson and S. Jajodia, Exploring steganography: seeing the unseen, IEEE Computer, pp. 26-34, February (1998)
E Lin, E Delp, A Review of Data Hiding in Digital Images. Proceedings of the Image Processing, Image Quality, Image Capture Systems Conference (PICS'99), Savannah, Georgia, April 25-28, (1999).
NadeemAkhtar, Shahbaaz Khan, PragatiJohri, “An Improved Inverted LSB Image Steganography”, IEEE International Conference on Issues and Challenges in Intelligent Computing Techniques, 2014.
Abbas Cheddad, Joan Condell, Kevin Curran, Paul McKevitt, “Digital image steganography: Survey and analysis of current methods”, Elsevier, Signal Processing, Vol. 90, pp. 727-752, 18 August 2009.
Tanmay Bhattacharya, NilanjanDey, S. R. BhadraChaudhuri, “A Novel Session Based Dual Steganographic Technique Using DWT and Spread Spectrum” International Journal of Modern Engineering Research, Vol.1, pp. 157- 161, 2012.
Neil F. Johnson, SushilJajodia, “Exploring steganography: Seeing the unseen”, IEEE Computer Journal, Vol. 31, pp. 26–34, 1998.
K. Sakthisudhan, P. Prabhu, “Dual Steganography Approach for Secure Data Communication”, International Conference on Modeling, Optimization and Computing, Elsevier, Procedia Engineering, Vol. 38, pp. 412-417, 2012
karishmarathod, dr.j.p.patra, uditachauhan, “implementation of information security using object Oriented concept”. (ijcsits) 2016
Krishna Bhowal, DebasreeSarkar, S. Biswas, and ParthaPratimSarkar, “Secured Genetic Algorithm Based Image HidingTechnique with Boolean Functions”. International Journal of Network Security 2016
N. Pavani, B. Sarala, “ Secure Data Communication using Cryptography and Steganography Standards” International Journal of Emerging Engineering Research and Technology 2015
Mohammed Salem Atoum and Mohammed M. Abu Shquier, “A Various Issues in Image Steganography that Using LSBTechnique”. International Journal of Computer Networks and Communications Security 2015
Amba Mishra, PrashantJohri, “ A Review on Video Steganography using GA”. IJIACS 2015.
NishantPattani, KishanPatel ,Nirmal Patel, KashyapPandya and Amruta Patel, “2015 IJREST
YamunaDasar, Preethi. P, “ A Secure Image Steganography Based on RSA Algorithm and Random Pixel Selection Technique”. IJRETM-2015
P. Rameshkumar, M. Monisha and B. Santhi, “Enhancement of Information Hiding in AudioSignals with Efficient LSB based Methods”.Indian Journal of Science and Technology 2014
GauravSingh,KuldeepTiwari,Shubhangi Singh, “Audio Steganography using RSA Algorithm and Genetic based Substitution method to Enhance Security”. IJSER © 2014
DOI: http://dx.doi.org/10.19732/10.19732/vol1122016
Refbacks
- There are currently no refbacks.
Copyright (c) 2016 International Journal of Computing and Informatics (IJCANDI)

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
International Journal of Computing and Informatics (eISSN: 2502-2334)
Organized by Universitas Mulawarman, Universiti Malaysia Sabah, Universitas Muslim Indonesia
Published by Universitas Mulawarman
W : http://ijcandi.org
E : ijcandi@unmul.ac.id or haviluddin.ijcandi@gmail.com

IJCANDI is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
View My Stats