Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference34 articles.
1. Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl 78:17799–17823
2. Adli A, Mirza H, Nakao Z (2008) A watermarking approach for MIDI file based on velocity and duration modulation. In: International conference on knowledge-based and intelligent information and engineering system, Zagreb, Croatia, pp 133–140.
3. Adli A, Nakao Z (2005) Three steganography algorithms for MIDI files. In: 2005 international conference on machine learning and cybernetics, Guangzhou, China, pp 2401–2404
4. Ahn JH, Boneh D, Camenisch J, Hohenberger S, Shelat A, Waters B (2015) Computing on authenticated data. J Cryptol 28:351–395
5. Biryukov A, Khovratovich D (2009) Related-key cryptanalysis of the full AES-192 and AES-256. In: ASIACRYPT 2009, LNCS, 5912. Springer, Heidelberg, pp 1–18
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献