Author:
Murhty G. Krishna,Kanimozhi T.
Publisher
Springer International Publishing
Reference20 articles.
1. Kortsarts, Y., & Kempner, Y. (2015) Steganography and cryptography inspired enhancement of introductory programming courses. InformationSystems Education Journal (ISEDJ), ISSN: 1545-679X.
2. Krishnan, R. B., Thandra, P. K., & Baba, M. S. (2017) An overview of text steganography. In 2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN) (pp. 1–6). https://doi.org/10.1109/ICSCN.2017.8085643.
3. Patil, A. S., & Sundari, G. (2018). An embedding of secret message in audio signal. In 2018 3rd International Conference for Convergence in Technology (I2CT) (pp. 1–3). https://doi.org/10.1109/I2CT.2018.8529549.
4. Ansari, M. D., Gunjan, V. K., & Rashid, E. (2021). On security and data integrity framework for cloud computing using tamper-proofing. In ICCCE 2020: Proceedings of the 3rd International Conference on Communications and Cyber Physical Engineering (pp. 1419–1427). Springer.
5. Karimullah, S., Vishnuvardhan, D., & Bhaskar, V. (2022). An improved harmony search approach for block placement for VLSI design automation. Wireless Personnel Communications, 127, 3041–3059. https://doi.org/10.1007/s11277-022-09909-2