O`Zbekiston Respublikasi Oliy Va O`Rta Maxsus Ta`Lim Vazirligi Mirzo Ulug`Bek Nomidagi O`Zbekiston Milliy Universiteti



Yüklə 1,01 Mb.
səhifə7/7
tarix26.09.2023
ölçüsü1,01 Mb.
#148687
1   2   3   4   5   6   7
Mustaqil ish

Adabiyotlar
1. Zaynalov N.R., Muhamadiev A.N., Kiyamov J. Kriptografiya usullariga doir oddiy misollar// Fizika, matematika va informatika jurnali, 2019, № 2, 26-34 b.
2. Fabien A.P. Petitcolas, Ross J.Anderson, Markus G.Kuhn. (1999). Information hiding—a survey. In: Proc IEEE 87(7): pp.1062-1078.
3. Por LY, Ang TF, Delina B (2008) WhiteSteg-a new scheme in information hiding using text steganography. WSEAS Trans Comput 7(6): pp.735-745.
4. Changder S, Ghosh D, Debnath N.C. (2010). Linguistic approach for text steganography through Indian text. In: 2010 2nd international conference on computer technology and development, pp. 318-322
5. Ross J.Anderson, Fabien A.P. Petitcolas. (1998). On the limits of steganography. IEEE J Sel Areas Commun 16(4): pp.474-481.
6. Hassan Shirali-Shahreza M., Mohammad Shirali-Shahreza (2006) A new approach to persian/arabic text steganography. In: 5th IEEE/ACIS international conference on computer and information science and 1st IEEE/ACIS international workshop on component-based software engineering, software archi¬tecture and reuse, pp 310-315.
7. Bala Krishnan R., Prasanth Kumar Thandra, M. Sai Baba. An overview of text steganography. 4th International Conference on Signal Processing, Communications and Networking (ICSCN -2017), March 16 - 18, 2017, Chennai, INDIA .
8. Zaynalov N.R., Narzullaev U.Kh., Muhamadiev A.N., Bekmurodov U.B., Mavlonov O.N. Features of using Invisible Signs in the Word Environment for Hiding Data. 2019. International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8, Issue-9S3, July 2019. pp.1377-1379.
9. Tiwari R.K., Sahoo G. Microsoft power point files: A secure steganographic carrier. 2011. International Journal of Digital Crime and Forensics. 3(4), pp. 16-28
10.Shut’ko N. P. The algorithms of realization of text steganography methods based on the modification of the geometric and color text parameters. Belarusian State Technological University. BGTU. № 6 2016, pp.160-165.
11.Hassan Shirali-Shahreza M., Mohammad Shirali-Shahreza (2008) A new dynonym text steganography. In: International conference on intelligent information hiding and multimedia signal processing, pp. 1524-1526.
12.Blinova E. A. Steganographic method based on the line-shift coding method on non-displayed symbols of the electronic text document. Belarusian State Technological University. BGTU. № 6 2016, pp.166-169.
13.Islomov S.Z., Mavlonov O.N., Muhamadiev A.N., Shodmonov D.A., Djumaev S.N. New authentication scheme for cloud computing. 2018. Journal of Advanced Research in Dynamical and Control Systems. 10(10), с. 2316-2319.
14. Canteaut A., Filiol E. Ciphertext only Reconstruction of Stream Ciphers Based on Combination Generators. Berlin: Springer, 2001. 16 p. 2. Скляр Б. Цифровая Связь.
Yüklə 1,01 Mb.

Dostları ilə paylaş:
1   2   3   4   5   6   7




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin