IJIFR VOLUME 3 ISSUE 12 AUGUST 2016
RESEARCH PAPER
RESEARCH PAPER
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
ISSN: 2347-1697<br />
International Journal of Informative & Futuristic Research (<strong>IJIFR</strong>)<br />
Volume - 3, Issue -<strong>12</strong>, August <strong>2016</strong><br />
Continuous 36 th Edition, Page No: 4613-4619<br />
[2] Javelin Strategy & Research, “2013 Identify Fraud<br />
Report,”https://www.javelinstrategy.com/brochure/276.<br />
[3] Anti-Phishing Working Group (APWG), “Phishing Activity Trends<br />
Report,2013,”http://docs.apwg.org/reports/apwg_trends_report_q2_2013.pdf .A<br />
[4] A.Joseph Raphael,Dr.V Sundaram, “Cryptography and Steganography – A Survey ”,Int. J.<br />
Comp. Tech. Appl., Vol 2 (3), 626-630.<br />
[5] Fridrich, J., Goljan, M., and Hogea, D. (2002). Steganalysisof jpeg images: Breaking the f5<br />
algorithm. In Proc.ofIn 5th InternationaWorkshop on Information Hiding..<br />
[6] http://kalanir.blogspot.in/2010/02/how-to-split-image-into-chunks-java.html.<br />
[7] Hare Ram Sah, Dr.G.Gunasekaran Professor ,”Privacy preserved data mining using visual<br />
steganography and encryption”, The 10th<br />
International Conference on Computer<br />
Science & Education (ICCSE 2015) July 22-24, 2015. Fitzwilliam College, Cambridge<br />
University, UK.<br />
[8] Souvik Roy, P. Venkateswaran,” Online Payment System using Steganography and Visual<br />
Cryptography”, 2014 IEEE Students’ Conference on Electrical, Electronics and Computer<br />
Science<br />
Arya Sudersanan, Reji George:: Privacy Preserved Online Garment<br />
Designing Using Cryptography, Visual Steganography & Image<br />
Slicing<br />
4619