Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference35 articles.
1. Abu-marie W, Gutub A, Abu-mansour H (2010) Image based steganography using truth table based and determinate array on RGB indicator. Int J Signal Image Process 1
2. Al-Otaibi NA, Gutub AA (2014) 2-Leyer security system for hiding sensitive text data on personal computers. Lect notes Inf theory 2:151–157. doi:
https://doi.org/10.12720/lnit.2.2.151-157
3. Al-Otaibi N, Gutub A (2014) Flexible stego-system for hiding text in images of personal computers based on user security priority. (AET-2014). Proc 2014 Int Conf Adv Eng Technol 250–256
4. Antonio J, Noriega M, Kurkoski BM, et al (2011) Image authentication and recovery using BCH error-correcting codes. Int J Comput 5
5. Chan CS, Chang CC (2007) An efficient image authentication method based on hamming code. Pattern Recogn 40:681–690.
https://doi.org/10.1016/j.patcog.2006.05.018
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献