RESEARCH AND PROTOTYPING METHODS OF STEGANOGRAPHY USING MOSAIC
Main Article Content
Abstract
Article Details
References
Inad, Aljarrah, Abdullah, Al-Amareen, Abdelrahman, Idries and Osama, Al-Khaleel (2014), “Image Mosaicing Using Binary Edge Detection”, Proc. of the Int. conf. on Comp. Technology and Information Management, Dubai, UAE, 2014, pp. 187-190, available to: https://www.researchgate.net/figure/Gray-scale-image_fig1_261551383
Pevnev, V. and Frolov, V. (2018), “Results of studies of generators of pseudorandom sequences with dynamic parameters”, Control, navigation and communication systems, Vol. 4 (50), pp. 139-143, DOI: https://doi.org/10.26906/SUNZ.2018.4.139.
Neil F., Johnson, Zoran, Duric and Sushil, Jajodi (2012), [Information Hiding: Steganography and Watermarking-Attacks and Countermeasures, Springer Science & Business Media, 137 p.
Abdelrahman Desoky, Noiseless Steganography: The Key to Covert Communications, CRC Press, 2016 – 300 p.
Jessica, Fridrich (2010), Steganography in Digital Media: Principles, Algorithms, and Applications, Cambridge University Press, 437 p.
Frank Y., Shih (2017), Digital Watermarking and Steganography:
Fundamentals and Techniques, CRC Press, 200 p.
Frank Y., Shih (2017), Multimedia Security: Watermarking, Steganography, and Forensics, CRC Press, 423 p.
Kazuhiro, Kondo (2012), Multimedia Inf. Hiding Technologies and Methodologies for Controlling Data, IGI Global, 497 p.
Barney, Warf (2018), The SAGE Encyclopedia of the Internet, SAGE, 1120 p.
Pevnev, V., Novakov, Y., Tsuranov, M. and Kharchenko V. (2017), “The Method of Data Integrity Assurance for Increasing IoT Infrastructure Security”, Proc. of the 31 th Int. Conference on Information Technologies (InfoTech-2017), pp. 27-36.