Pooja, and Ahirao. IJIRIS:: International Journal of Innovative Research in Information Security, Volume V (Issue VIII):
471-474(September 2018)1. K. Wu and C. Wang, “Steganography using reversible texture synthesis” IEEE Transactions on Image Processing Vol.24 pp 130-139,January 2015 2. Shreyank N Gowda, “An Advanced Diffie-Hellman Approach to Image Steganography ” IEEE Transactions on advance network and telecommunication system Vol.19 pp 1-4,june 2016 3. Sherin Sugathan, “An Improved LSB Embedding Technique for Image Steganography ” International conference on applied and theoretical computing and communication technology Vol.33 pp 609-612,2016 4. S. Singh and V. K. Attri Dual Layer Security of data using LSB Image Steganography Method and AES Encryption Algorithm International Journal of Signal Processing, Image Processing and Pattern Recognition Vol. 8, No. 5 , pp. 259-266 ,2015 5. Utsav Sheth and Shiva Saxena, “Image Steganography Using AES Encryption and Least Significant Nibble ” International conference on communication and signal processing Vol.11 pp 0876-0879,2016 6. Radu Pietraru, “Secure communication method based on encryption and steganography” International conference on control system and computer science Vol.31 pp 453-458,2017 7. Y Manjula and K B Shivakumar ,”Enhanced Secured Image Steganography using Double Encryption Algorithm” International Conference on Computing for Sustainable Global Development (IndiaCom),2016 8. Tanushree Shelare and Varsha Powar,”A secure transmission approach using B-Trees in steganography”International Conference on Automatic Control and Dynamic Optimization Techniques,2016 9. https://www.sans.org/reading-room/whitepapers/vpns/review-chaffing-winnowing-876 10. http://www.asp.net/: This is the official Microsoft ASP.NET web site. It has a lot of: tutorials, training videos, and sample projects. 11. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6850714&queryText%3Dimage+steganography 12. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6658020&queryText%3Dimage+steganography.
DOI: doi://10.26562/IJIRIS.2018.SPIS10083
Please choose a person to relate this publication to
To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.
You can add a new person with the name "Pooja,", or you can connect "Pooja," with a person entry that is so far only been referred to by another name (such as a former name or an alias name).
Your choice of the person associated to the publication can be saved in our system, so that no other have to make this choice again. Do you want to save your choice?
Disambiguation
The disambiguation is part of the BibSonomy genealogy project and is used to link unassigned publications to an existing person. You see the referenced publication of the author "Pooja,", a list of already existing persons with the same author-name, and if available, other publications associated to them. Now you have the option to assign this publication to a person or create a new one.