Publisher
Springer International Publishing
Reference50 articles.
1. Attaby, A.A., Ahmed, M.F.M.M., Alsammak, A.K.: Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3. Ain Shams Eng. J. 9, 1965–1974 (2018). https://doi.org/10.1016/j.asej.2017.02.003
2. Younus Z.S., Hussain, M.K.: Image steganography using exploiting modification direction for compressed, encrypted data. Journal of King Saud University–Computer and Information Sciences, an article in press (2019). https://doi.org/10.1016/j.jksuci.2019.04.008
3. Morkel, T., Eloff, J., Olivier, M.: An overview of image steganography. In: Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandston, South Africa (2005)
4. Rehman, A., Alqahtani, S., Altameem, A., Saba, T.: Virtual machine security challenges: case studies. Int. J. Mach. Learn. Cybern. 5(5), 729–742 (2013). https://doi.org/10.1007/s13042-013-0166-4
5. Kumar, V., Kumar, D.: Performance evaluation of modified colour image steganography using discrete wavelet transform. J. Intell. Syst. (2017). https://doi.org/10.1515/jisys-2017-0134
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献