Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. Jihui Chen, Xiaoyao Xie, and Fengxuan Jing, "The security of shopping online," Proceedings of 2011 International Conference on Electronic and Mechanical Engineering and Information Technology (EMEIT), vol. 9,pp. 4693-4696, 2011
    2. Javelin Strategy & Research, ―2013 Identify Fraud Report,‖ https://www.javelinstrategy.com/brochure/276.
    3. Anti-Phishing Working Group (APWG), ―Phishing Activity Trends Report,2013,‖http://docs.apwg.org/reports/apwg_tr ends_report_q2_2013.pdf .
    4. Jack Brassil, Steven Low, Nicholas Maxemchuk, Larry O’Gorman, ―Hiding Information in Document Images,‖ Proceedings of the 1995 Conference on Information Sciences and Systems, Johns Hopkins University, pp. 482-489, 1995.
    5. J. Chen, T. S. Chen, M. W. Cheng, ―A New Data Hiding Scheme in Binary Image,‖ Proceeding of Fifth International Symposium on Multimedia Software Engineering, pp. 88-93, 2003.
    6. Hu ShengDun, U. KinTak, ―A Novel Video Steganography Based on Non-uniform Rectangular Partition,‖ Proceding of 14th International Conference on Computational Science and Engineering, pp. 57-61, Dalian, Liaoning, 2011.
    7. Daniel Gruhl, Anthony Lu, Walter Bender, ―Echo Hiding,‖ Proceedings of the First International Workshop on Information Hidding, pp. 293- 315, Cambridge, UK, 1996.
    8. Walter Bender, Daniel Gruhl, Norishige Morimoto, A. Lu, ―Techniques for Data Hiding,‖ IBM Systems Journal, Vol. 35, Nos. 3 & 4, pp. 313- 336, 1996.
    9. K. Bennet, ―Linguistic Steganography: Surevey, Analysis, and Robustness Concerns for Hiding information in Text,‖ Purdue University, Cerias Tech Report 2004—2013.
    10. J.C. Judge, ―Steganography: Past, Present, Future,‖ SANS Institute, November 30, 2001.
    11. M. Naor and A. Shamir, ―Visual cryptography,‖ Advances in Cryptograhy. EUROCRYPT’94, LNCS, vol. 950, pp. 1–12, 1995.
    12. Jaya, Siddharth Malik, Abhinav Aggarwal, Anjali Sardana, ―Novel Authentication System Using Visual Cryptography,‖ Proceedings of 2011 World Congress on Information and Communication Technologies, pp. 1181-1186, Mumbai, India, 2011.
    13. Chetana Hegde, S. Manu, P. Deepa Shenoy, K. R. Venugopal, L M Patnaik, ―Secure Authentication using Image Processing and Visual Cryptography for Banking Applications,‖ Proceedings of 16th International Conference on Advanced Computing and Communications, pp. 65-72, Chennai, India, 2008

Recent Article