Back to Results
First PageMeta Content
Computing / Pseudorandom number generators / Binary arithmetic / Linear feedback shift register / Steganography / Steganalysis / Peak signal-to-noise ratio / Primitive polynomial / Pixel / Cryptography / Espionage / Image processing


International Journal of Computer Applications (0975 – 8887) Volume 18– No.2, March 2011
Add to Reading List

Document Date: 2011-03-30 11:01:02


Open Document

File Size: 382,43 KB

Share Result on Facebook

City

Norwood / /

Company

Altera / Reconfigurable Hardware / Prototype Hardware / Amirtharajan / Francisco Rodriguez-Henriquez N.A. / Xilinx / /

Continent

Asia / /

Country

India / /

Currency

pence / /

Facility

port of PC / SASTRA University / Electronics Engineering SASTRA University / /

IndustryTerm

stego algorithm / properties like specific hardware / communication systems / cryptographic algorithms / stego chip / steganographic algorithm / steganographic systems / information hiding algorithm / steganography algorithms / web edition / /

Organization

Har Narayan Upadhyay Associate Dean School / Electrical & Electronics Engineering SASTRA University / Information Hiding Approach R.Sundararaman Assistant Professor School of Electrical / US Federal Reserve / SASTRA University / /

Person

Lena Images / M.K.Guruprasanna / Abbas Cheddad / Chun Wu / Hala A. Farouk / Magdy Saeb / R.John Bosco Balaguru / Uwe Meyer-Baese / Lena Table / R.Rangarajan / Joan Condell / Kevin Curran / Vivek Ganesan / S. Arjun / R.Ashwath / Paul Mc Kevitt / Wen-Hsiang Tsai / /

/

Position

Cover image Cameraman / Associate Dean / cameraman / Assistant Professor / /

ProgrammingLanguage

LabVIEW / /

ProvinceOrState

Massachusetts / /

Technology

FPGA / bit stream encryption / RAM / ASCII / information hiding algorithm / steganographic algorithm / data hiding / Secret Key / Stego chip / Random Access / simulation / SRAM / Image processing / DSP / corresponding extracting algorithm / GUI / UART / using 2-D Image Processing / /

SocialTag