20.09.2016 Views

IJIFR VOLUME 3 ISSUE 12 AUGUST 2016

RESEARCH PAPER

RESEARCH PAPER

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ISSN: 2347-1697<br />

International Journal of Informative & Futuristic Research (<strong>IJIFR</strong>)<br />

Volume - 3, Issue -<strong>12</strong>, August <strong>2016</strong><br />

Continuous 36 th Edition, Page No: 4613-4619<br />

[2] Javelin Strategy & Research, “2013 Identify Fraud<br />

Report,”https://www.javelinstrategy.com/brochure/276.<br />

[3] Anti-Phishing Working Group (APWG), “Phishing Activity Trends<br />

Report,2013,”http://docs.apwg.org/reports/apwg_trends_report_q2_2013.pdf .A<br />

[4] A.Joseph Raphael,Dr.V Sundaram, “Cryptography and Steganography – A Survey ”,Int. J.<br />

Comp. Tech. Appl., Vol 2 (3), 626-630.<br />

[5] Fridrich, J., Goljan, M., and Hogea, D. (2002). Steganalysisof jpeg images: Breaking the f5<br />

algorithm. In Proc.ofIn 5th InternationaWorkshop on Information Hiding..<br />

[6] http://kalanir.blogspot.in/2010/02/how-to-split-image-into-chunks-java.html.<br />

[7] Hare Ram Sah, Dr.G.Gunasekaran Professor ,”Privacy preserved data mining using visual<br />

steganography and encryption”, The 10th<br />

International Conference on Computer<br />

Science & Education (ICCSE 2015) July 22-24, 2015. Fitzwilliam College, Cambridge<br />

University, UK.<br />

[8] Souvik Roy, P. Venkateswaran,” Online Payment System using Steganography and Visual<br />

Cryptography”, 2014 IEEE Students’ Conference on Electrical, Electronics and Computer<br />

Science<br />

Arya Sudersanan, Reji George:: Privacy Preserved Online Garment<br />

Designing Using Cryptography, Visual Steganography & Image<br />

Slicing<br />

4619

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!