Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference36 articles.
1. Abd El-Latif AA, Li L, Wang N, Han Q, Niu X (2013) A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Processing 93:2986–3000 Published by Elsevier BV
2. Abd-El-Atty B, Iliyasu AM, Alaskar H, Abd El-Latif AA (2020) A robust quasi-quantumwalks-based steganography protocol for secure transmission of images on cloud-based e-healthcare platforms. Sensors 20:3108. https://doi.org/10.3390/s20113108
3. Abdel-Wahab OF, Hussein AI, Hamed HFA, Kelash HM, Khalaf AAM, Ali HM (June 2019) Hiding data in images using steganography techniques with compression algorithms. Telkomnika 17(3):1168–1175. https://doi.org/10.12928/TELKOMNIKA.v17i3.12230
4. Alan Anwer Abdulla (October 2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography, School of Science in the University of Buckingham
5. Abdulla AA, Sellahewa H, Jassim SA (2014) Steganography based on pixel intensity value decomposition, mobile multimedia/image processing, security, and applications. Proc of SPIE 9120:912005 · © 2014 SPIE. https://doi.org/10.1117/12.2050518
Cited by
25 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献