A Novel Approach Using Steganography and Cryptography in Business Intelligence

作者: Sabyasachi Pramanik , Ramkrishna Ghosh , Mangesh M Ghonge , Vipul Narayan , Mudita Sinha

DOI: 10.4018/978-1-7998-5781-5.CH010

关键词:

摘要:

参考文章(40)
Samir k Bandyopadhyay, Sabyasachi Pramanik, Application of Steganography in Symmetric Key Cryptography with Genetic Algorithm international conference on bioinformatics. ,vol. 10, pp. 1791- 1799 ,(2013) , 10.24297/IJCT.V10I7.7027
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 26, pp. 96- 99 ,(1983) , 10.1145/357980.358017
Hare Ram Sah, G. Gunasekaran, Privacy preserving data mining using visual steganography and encryption international conference on computer science and education. pp. 154- 158 ,(2015) , 10.1109/ICCSE.2015.7250234
Dr. Jagadeesh Kivudanavar, , India’s Overseas Trade in the Early Medieval Period International journal of scientific research. ,vol. 2, pp. 170- 171 ,(2012) , 10.15373/22778179/FEB2013/56
Aqsa Rashid, Muhammad Khurrum Rahim, Critical Analysis of Steganography "An Art of Hidden Writing" International journal of security and its applications. ,vol. 10, pp. 259- 282 ,(2016) , 10.14257/IJSIA.2016.10.3.24
Venkata Krishna Pavan Kalubandi, Hemanth Vaddi, Vishnu Ramineni, Agilandeeswari Loganathan, A novel image encryption algorithm using AES and visual cryptography international conference on next generation computing technologies. ,vol. 2016, pp. 808- 813 ,(2016) , 10.1109/NGCT.2016.7877521
T. von Leipzig, M. Gamp, D. Manz, K. Schöttle, P. Ohlhausen, G. Oosthuizen, D. Palm, K. von Leipzig, Initialising Customer-orientated Digital Transformation in Enterprises Procedia Manufacturing. ,vol. 8, pp. 517- 524 ,(2017) , 10.1016/J.PROMFG.2017.02.066
Shreyank N Gowda, An advanced Diffie-Hellman approach to image steganography 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). pp. 1- 4 ,(2016) , 10.1109/ANTS.2016.7947849
Susmita Mahato, Danish Ali Khan, Dilip Kumar Yadav, A modified approach to data hiding in Microsoft Word documents by change-tracking technique Journal of King Saud University - Computer and Information Sciences. ,vol. 32, pp. 216- 224 ,(2017) , 10.1016/J.JKSUCI.2017.08.004
Bikash Debnath, Jadav Chandra Das, Debashis De, Design of image steganographic architecture using quantum-dot cellular automata for secure nanocommunication networks Nano Communication Networks. ,vol. 15, pp. 41- 58 ,(2017) , 10.1016/J.NANCOM.2017.11.001