Author:
Chang Te-Jen,Pan I-Hui,Huang Ping-Sheng,Hu Chen-Hao
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference41 articles.
1. Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate Array on RGB Indicator. International Journal of Signal and Image Processing (IJSIP) 1(3):196–204
2. Agarwal H, Raman B, Venkat I (2015) Blind reliable invisible watermarking method in wavelet domain for face image watermark. Multimedia Tools and Applications 74(17):6897–6935
3. Agarwal H, Atrey PK, Raman B (2015) Image watermarking in real oriented wavelet transform domain. Multimedia Tools and Applications 74(23):10883–10921
4. Algashaam FM, Nguyen K, Alkanhal M, Chandran V, Boles W, Banks J (2017) Multispectral periocular classification with multimodal compact multi-linear pooling. IEEE Access 5:14572–14578
5. Al-Otaibi NA and Gutub AA (2014) 2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers. In: The 3rd International Conference on Advancements in Information Technology (ICAIT 2014) pp. 73–79
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献