1 |
S. Malviya, M. Saxena, K. K. Nayak and A. Khare, "Audio Steganography in a Nutshell", International Journal of Electronics Communication and Computer Technology, Vol. 2, pp. 219-222, 2012.
|
2 |
B. Santhi, G. Radhika and S. R. Reka, "Information Security using Audio Steganography-A Survey", Research Journal of Applied Sciences, Engineering and Technology, Vol. 4, No. 14, pp. 2255-2258, 2012.
|
3 |
방송통신위원회, "정보보호실태조사와 정보보호지수", http://www.kcc.go.kr/, 2012. 03. 27.
|
4 |
지선수, "스테고 이미지에서 은닉메시지 감지기법", KIISC, Vol. 14, No. 3, pp. 37-43, 2009.
과학기술학회마을
|
5 |
S. Swaminathan, H. Manikandan and S. Suganya, "High Confidentiality Based Secured Communication through Audio", European Journal of Scientific Research, Vol. 73, No. 2, pp. 157-162, 2012.
|
6 |
G. Nehru and P. Dhar, "A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach", International Journal of Computer Science Issues, Vol. 9, No. 2, pp. 402-406, January 2012.
|
7 |
M. L. MatKiah, B. B. Zaidan, A. A. Zaidan, A. Mohammed Ahmed and Sameer Hasan Al-bakri, "A Review of Audio based Steganography and Digital Watermarking", International Journal of the Physical Sciences, Vol. 6, No. 16, pp. 3837-3850, August 2011.
|
8 |
A. Z. Al-Othmani, A. A. Manaf and A. M. Zeki, "A Survey on Steganography Techniques in Real Time Audio Signals and Evaluation", International Journal of Computer Science Issues, Vol. 9, No 1, pp. 30-37, January 2012.
|
9 |
V. L. Reddy, A. Subramanyam and C. Reddy, "Implementation of LSB Steganography and its Evaluation for Various File Formats", International Journal of Advanced Networking and Applications 868, Vol. 2, Issue 5, pp. 868-872, 2011.
|