Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference39 articles.
1. Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate array on RGB indicator. Int J Sign Image Process 1(3):196–204
2. Akhaee MA, Sahraeian SME, Sankur B, Marvasti F (2009) Robust scaling-based image watermarking using maximum-likelihood decoder with optimum strength factor. IEEE Trans Multimed 11(5):822–833
3. Akhaee MA, Sahraeian SME, Marvasti F (2010) Contourlet based image watermarking using optimum detector in noisy environment. IEEE Trans Image Process 19(4):967–980
4. Al-Otaibi NA, Gutub AA (2014) 2-Leyer security system for hiding sensitive text data on personal computers. Lect Notes Info Theory 2(2):151–157
5. Azizi S, Samavi S, Mohrekesh M, Shirani S (2013) Cascaded transform space watermarking based on analysis of local entropy variation. Proc Int Conf Multimed Expo Workshops (ICMEW): 1–6
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献