Type of Reference, Reference Citation & In-Text Citation Quoted Text Summary/Paraphrase of Quoted Text
Type of Reference, Reference Citation & In-Text Citation Quoted Text Summary/Paraphrase of Quoted Text
Department of English
Institute of Information & Computing Sciences
English 108A - Technical Writing
SUMMARY & PARAPHRASE OF REFERENCES MATRIX
Type
of
Reference, Quoted Text
Reference Citation & In-Text
Citation
Summary/Paraphrase
Text
Research Journal
Research Journal
of
Quoted
Contourlet
Transform,
International
Journal
on
Cryptology and Information
Security 2(3), p.77. Retrieved
March
12,
2015,
from
http://airccse.org/journal/ijcis/p
apers/2312ijcis07.pdf
steganography
algorithms
used. detects hidden message without the
Universal steganalysis is also known as
knowledge of stego algortihms used.
blind steganalysis and it is more
applicable and practicable.
Related Systems
Research Journal
Most
steganographic
algorithms
are
Related Systems
AES
In
the
proposed
AES
based
steganography model, the strength of Sbox mapping and secrete key for
Research Journal
encrypting secrete image, improves
security and image quality compared to
Ramaiya, M., Hemrajani, N., & existing
algorithms.
All
of
the
should
consist
extracting
only.
of
embedding
Textual
and
data
is
based
steganography
model
Related Systems
Research Journal
Padmavathi, B., & Kumari, S.
(2013).
A
Survey
on
Performance Analysis of DES,
AES and RSA Algorithm along
with
LSB
Substitution
Technique, International Journal
of Science and Research 2(4),
p.173 Retrieved March 12,
2015,
from
http://www.ijsr.net/archive/v2i4/
IJSRON120134.pdf
Different
tested
encryption
with
steganography
LSB
algorithms
are
substitution,
technique.
a
AES
decryption
time,
its
decryption
Research Journal
with
MSE
and
PSNR.
After
no
presence
of
any
hidden
message.
be
solved
from
the
problems
of
to
support
as
key
performance.
the
number
of
blocks
and
&
Steganography is the art of hiding
information in ways that prevent the
detection of hidden messages. It
includes a vast array of secret
communications methods that conceal
the message's very existence. These
methods
include
invisible
inks,
microdots,
character
arrangement,
digital signatures, covert channels, and
information
communication
that
inhibit
and
the
involves
collection
of
establishes
to
cloak
the
intended
character
arrangement,
Research Journal
Blind Image Steganalysis
Based
the
hidden
message.
Its
On Contourlet Transform
(Aritha & Natarahan, 2012)
Natarajan, V., & Anitha, R.
(2012).
Blind
Image
Steganalysis
Based
on
Contourlet
Transform.
International
Journal
on
Cryptography and Information
Security, 2(3), 77.
about
the
presence
of
embedded
for
breaking
steganography.
universal
detect
steganalysis
the
message
The
existence
without
specific
other
,
of
one
which
a
knowing
is
can
hidden
the
&
Rasheed,