Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference53 articles.
1. Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate Array on RGB indicator. International Journal of Signal and Image Processing 1:196–204
2. Al-Dmour H, Al-Ani A (2016) A steganography embedding method based on edge identification and XOR coding. Expert Syst Appl 46:293–306
3. Almeida J, Leite NJ, Torres R d S (2012) Vison: Video summarization for online applications,. Pattern Recogn Lett 33:397–409
4. Al-Otaibi NA, Gutub AA (2014a) 2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers,. Lecture Notes on Information Theory Vol 2
5. Al-Otaibi NA, Gutub AA (2014b) Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority,. Proceedings of 2014 International Conference on Advanced Engineering Technologies (AET-2014):250–256
Cited by
59 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献