Steganography over Redundant Residue Number System Codes
Tài liệu tham khảo
Antao, 2013, The CRNS framework and its application to programmable and reconfigurable cryptography, TACO, 9, 33:1, 10.1145/2400682.2400692
Asif, 2018, A fully RNS based ECC processor, Integration, 61, 138, 10.1016/j.vlsi.2017.11.010
Azizifard, 2014, Data steganography on VoIP through combination of residue number system and DNA sequences, Journal of Advances in Computer Research, 5, 7
Bajard, 2009, Selected RNS bases for modular multiplication, 25
Bajard, 2004, RNS bases and conversions, 5559, 60
Belhamra, 2018, A steganogaphic scheme for MAC-independent opportunistic routing and encoding (MORE) protocol, 254
Belhamra, 2019, Introduction to steganography in RRNS based communications, 21:1
Belhamra, 2019, Steganogaphy using Mac-independent opportunistic routing and encoding (MORE) protocol based communications, 1118, 66
Celesti, 2016, Adding long-term availability, obfuscation, and encryption to multi-cloud storage systems, J Network and Computer Applications, 59, 208, 10.1016/j.jnca.2014.09.021
Chang, 2015, Residue number systems: A new paradigm to datapath optimization for low-power and high-performance digital signal processing applications, IEEE circuits and systems magazine, 15, 26, 10.1109/MCAS.2015.2484118
Chen, 2013, Energy-efficient digital signal processing via voltage-overscaling-based residue number system., IEEE Trans VLSI Syst, 21, 1322, 10.1109/TVLSI.2012.2205953
Chervyakov, 2019, AR-RRNS: configurable reliable distributed data storage systems for internet of things to ensure security, Future Generation Comp Syst, 92, 1080, 10.1016/j.future.2017.09.061
Etzel, 1980, Redundant residue number systems for error detection and correction in digital filters, IEEE Transactions on Acoustics, Speech, and Signal Processing, 28, 538, 10.1109/TASSP.1980.1163442
Goh, 2008, Multiple error detection and correction based on redundant residue number systems, IEEE Trans Communications, 56, 325, 10.1109/TCOMM.2008.050401
Grabski, 2013, Steganography in OFDM symbols of fast IEEE 802. 11n networks, 158
Haron, 2009, Using RRNS codes for cluster faults tolerance in hybrid memories, 85
Haron, 2011, Redundant residue number system code for fault-tolerant hybrid memories, J Emerg Technol Comput Syst, 7, 4:1, 10.1145/1899390.1899394
Jouhari, 2011, A new steganographic scheme based on first order reed muller codes - A new steganographic scheme, 351
Junior, 2011, Using the redundant residue number system to increase routing dependability on mobile ad hoc networks, Journal of Selected Areas in Telecommunications (JSAT), 4, 67
Justel, 1997, A multivariate kolmogorov-smirnov test of goodness of fit, Statistics & Probability Letters, 35, 251, 10.1016/S0167-7152(97)00020-5
Kaur, 2015, Countermeasures for covert channel-internal control protocols, 422
Keller, 2000, Adaptive redunant residue number system coded multicarrier modulation, IEEE Journal on Selected Areas in Communications, 18, 2292, 10.1109/49.895034
Krätzer, 2006, WLAN steganography: a first practical review, 17
Krishna, 1992, A coding theory approach to error control in redundant residue number systems. i. theory and single error correction, IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, 39, 8, 10.1109/82.204106
Mazurczyk, 2014, Using transcoding for hidden communication in IP telephony, Multimedia Tools Appl, 70, 2139, 10.1007/s11042-012-1224-8
Mohan, 2016, 10.1007/978-3-319-41385-3
Munuera, 2007, Steganography and error-correcting codes, Signal Processing, 87, 1528, 10.1016/j.sigpro.2006.12.008
Orton, 1992, New fault tolerant techniques for residue number systems, IEEE Trans Computers, 41, 1453, 10.1109/12.177315
Sousa, 2016, Combining residue arithmetic to design efficient cryptographic circuits and systems, IEEE Circuits and Systems Magazine, 16, 6, 10.1109/MCAS.2016.2614714
Sun, 1992, A coding theory approach to error control in redundant residue number systems. ii. multiple error detection and correction, IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, 39, 18, 10.1109/82.204107
Szczypiorski, 2003, Steganography in TCP/IP networks
Szczypiorski, 2016, Steganography in IEEE 802. 11 OFDM symbols, Security and Communication Networks, 9, 118, 10.1002/sec.306
Tay, 2016, A non-iterative multiple residue digit error detection and correction algorithm in RRNS, IEEE Trans Computers, 65, 396, 10.1109/TC.2015.2435773
Tchernykh, 2018, AC-RRNS: anti-collusion secured data sharing scheme for cloud storage, Int J Approx Reasoning, 102, 60, 10.1016/j.ijar.2018.07.010
Vassalos, 2013, RNS assisted image filtering and edge detection, 1
Watson, 1966, Self-checked computation using residue arithmetic, Proceedings of the IEEE, 54, 1920, 10.1109/PROC.1966.5275
Westfeld, 2001, F5-A steganographic algorithm, 289
Xiao, 2016, New error control algorithms for residue number system codes, ETRI Journal, 38, 326, 10.4218/etrij.16.0115.0575
Ye, 2018, Resident: a reliable residue number system-based data transmission mechanism for wireless sensor networks, Wireless Networks, 24, 597, 10.1007/s11276-016-1357-1
Zheng, 2016, Parallel dna arithmetic operation with one error detection based on 3-moduli set, IEEE transactions on nanobioscience, 15, 499, 10.1109/TNB.2016.2574359
Zielińska, 2014, Trends in steganography, Commun ACM, 57, 86, 10.1145/2566590.2566610