Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference51 articles.
1. Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate array on rgb indicator. International Journal of Signal & Image Processing 1(3):196–204
2. Al-Juaid N A, Gutub A, Khan EA et al (2018) Enhancing pc data security via combining rsa cryptography and video based steganography
3. Al-Otaibi N A, Gutub A A (2014) 2-leyer security system for hiding sensitive text data on personal computers. Lecture Notes on Information Theory 2(2):151–157
4. Alanizy N, Alanizy A, Baghoza N, Al Ghamdi M, Gutub A (2018) 3-layer pc text security via combining compression, aes cryptography 2lsb image steganography. Journal of Research in Engineering and Applied Sciences (JREAS) 3(4):118–124
5. Alharthi N, Gutub A (2017) Data visualization to explore improving decision-making within hajj services. Scientific Modelling and Research 2(1):9–18
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献