Author:
Ngom Aminata,Djimnaibeye Sidoine,Ngom Ndeye Fatou,Sidibé Samba,Niang Oumar
Publisher
Springer Nature Switzerland
Reference24 articles.
1. Apnea-ECG Database. www.physionet.org/content/apnea-ecg/1.0.0/. Accessed 9 Nov 2021
2. Abd Elminaam, D.S., Abdual-Kader, H.M., Hadhoud, M.M.: Evaluating the performance of symmetric encryption algorithms. Int. J. Netw. Secur. 10(3), 216–222 (2010)
3. Abdullah, A.: Advanced encryption standard (AES) algorithm to encrypt and decrypt data, June 2017
4. Abdur Razzaq, M., Shaikh, R., Adnan, M., Ahmed, A.: Digital image security: fusion of encryption, steganography and watermarking. Int. J. Adv. Comput. Sci. Appl. 8 (2007). https://doi.org/10.14569/IJACSA.2017.080528
5. Bhardwaj, R., Sharma, V.: Image steganography based on complemented message and inverted bit LSB substitution. Procedia Comput. Sci. 93, 832–838 (2016). https://doi.org/10.1016/j.procs.2016.07.245, www.sciencedirect.com/science/article/pii/S1877050916314879