Author:
Xiang Hongyue,Liu Lingfeng
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference40 articles.
1. Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography [D]. University of Buckingham
2. Adbulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and Fibonacci bit-plane mapping [C]. Security Standardisation Research, SSR 8893:151–166
3. Anand A, Raj A, Kohli R, Bibhu V (2016) Proposed symmetric key cryptography algorithm for data security. 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), Noida, 159–162.
4. Bandt C, Pompe B (2002) Permutation entropy: a natural complexity measure for time series [J]. Phys Rev Lett 88(17):174102
5. Beiazi A, El-Latif AAA, Diaconu AV, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms [J]. Opt Lasers Eng 88:37–50
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献