Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,General Computer Science
Reference17 articles.
1. http://www.thehansindia.com/posts/index/2014-04-05/Andhra-University-official-website-hacked-by-Pakistan-cyber-experts-91089 , April 2014
2. A. Miyaji, Y. Mo, How to enhance the security on the least significant bit, The 11th International Conference on Cryptology and Network Security (CANS 2012), vol. 7712 (Springer, Berlin, 2012), pp. 263–279
3. J. Fridrich, J. Kodovský, Rich models for steganalysis of digital images. IEEE Trans. Inform. Forensics Secur. 7(3), 868 (2012)
4. C. Cachin, J. Camenisch, Encrypting keys securely. IEEE Secur. Priv. 8(4), 66–69 (2010)
5. W. Bender, D. Gruhl, N. Morimoto, A. Lu, Techniques for data hiding. IBM Syst. J. 35(3,4), 313–336 (1996)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Digital image watermarking using discrete cosine transformation based linear modulation;Journal of Cloud Computing;2023-06-24
2. Securing Multimedia Using a Deep Learning Based Chaotic Logistic Map;IEEE Journal of Biomedical and Health Informatics;2023-03
3. Secure Medical Data Abstraction Using Convolutional Neural Network;2023 11th International Conference on Internet of Everything, Microwave Engineering, Communication and Networks (IEMECON);2023-02-10
4. Privacy Preservation of Medical Health Records using Symmetric Block Cipher and Frequency Domain Watermarking Techniques;2022 International Conference on Inventive Computation Technologies (ICICT);2022-07-20
5. Privacy Protection of Digital Information using Frequency Domain Watermarking Technique;2021 4th International Conference on Recent Trends in Computer Science and Technology (ICRTCST);2022-02-11