Author:
Kumar Nishant,Ghuge Suyash,Jaidhar C. D.
Publisher
Springer International Publishing
Reference24 articles.
1. Sarkar, T., Sanyal, S.: Reversible and irreversible data hiding technique.
arXiv:1405.2684
(2014)
2. Shi, Y.Q., Li, X., Zhang, X., Wu, H., Ma, B.: Reversible data hiding: advances in the past two decades. IEEE Access 4, 3210–3237 (2016)
3. Soliman, S.M., Magdy, B., El Ghany, M.A.A.: Efficient implementation of the AES algorithm for security applications. In: IEEE Conference on System-on-Chip Conference (SOCC), pp. 206–210. IEEE (2016)
4. Honsinger, C.W., Jones, P., Rabbani, M., Stoffel, J.C.: Lossless Recovery of an Original Image Containing Embedded Data. U.S. (2001)
5. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3–4), 313–336 (1996)