Author:
El-Khamy Said E.,Korany Noha O.,El-Sherif Marwa H.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference22 articles.
1. Al-haj A (2014) An imperceptible and robust audio watermarking algorithm. EURASIP J Audio Speech Music Process. doi:
10.1186/s13636-014-0037-2
2. Antony J, Sobin CC, Sherly AP (2012) Audio steganography in wavelet domain a survey. Int J Comput Appl 52(13):33–37
3. Bansal N, Bansal A, Deolia VK, Pathak P (2015) Comparative analysis of LSB, DCT and DWT for digital watermarking. Int Conf Comput Sustain Glob Dev. doi:
10.1007/978-981-10-0767-5_13
4. Doshi R, Jain P, Gupta L (2012) Steganography and its applications in security. Int J Mod Eng Res 2(6):4634–4638
5. Goel S, Rana A, Kaur M (2013) Comparison of Image Steganography Techniques. International Journal of Computers and Distributed Systems 3(1):20–30
Cited by
29 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献