Author:
Ravindra Reddy K.,Vijayalakshmi P.
Publisher
Springer International Publishing
Reference21 articles.
1. Vasanth, S., & Dhikhi, T. (2016) Secure data transmission using steganography and encryption techniques. International Journal of Pharmacy and Technology, 8(4), 21130–21139.
2. Laskar, S. A., & Hemachandran, K. (2012). Secure data transmission using steganography and encryption technique. International Journal of Cooperative Information Systems, 2, 161–172.
3. Marwa, E., Ali, A. A., & Fatma, A. (2016) Data security using cryptography and steganography techniques. International Journal of Advanced Computer Science and Applications, 7(6). https://doi.org/10.14569/IJACSA.2016.070651.
4. Chandra, S., & Paira, S. (2019). Secure transmission of data using image steganography. ICTACT Journal on Image and Video Processing, August 2019, 10(01). https://doi.org/10.21917/ijivp.2019.0291.
5. Prasad, P. S., Sunitha Devi, B., Janga Reddy, M., & Gunjan, V. K. (2019). A survey of fingerprint recognition systems and their applications. In A. Kumar, S. Mozar, (Eds.), ICCCE 2018. Lecture Notes in Electrical Engineering (Vol. 500). Springer. https://doi.org/10.1007/978-981-13-0212-1_53.