Author:
Atawneh Samer,Almomani Ammar,Al Bazar Hussein,Sumari Putra,Gupta Brij
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference25 articles.
1. Al-Ani ZK et al (2010) Overview: main fundamentals for steganography. J Comput 2(3):158–165
2. Al-Dmour H, Al-Ani A (2016) A steganography embedding method based on edge identification and XOR coding. Exp Syst Appl 46:293–306
3. Al-Korbi HA, Al-Ataby A, Al-Taee MA, Al-Nuaimy W (2015) High-capacity image steganography based on Haar DWT for hiding miscellaneous data. IEEE Jordan Conf Appl Electrical Eng Comput Technol (AEECT) 1:1–6
4. Atawneh S, Almomani A, Sumari P (2013) Steganography in digital images: common approaches and tools. IETE Tech Rev 30(4):344–358
5. Baby D, Thomas J, Augustine G, George E, Michael NR (2015) A novel DWT based image securing method using steganography. Procedia Comput Sci 46:612–618
Cited by
122 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献