Author:
Shivaramakrishna D.,Nagaratna M.
Publisher
Springer Science and Business Media LLC
Reference20 articles.
1. Zeadally, S., Das, A. K., & Sklavos, N. (2021). Cryptographic technologies and protocol standards for Internet of Things. Internet of Things, 14, 100075. https://doi.org/10.1016/j.iot.2019.100075
2. Kansal S, Mittal M (2014). Performance evaluation of various symmetric encryption algorithms In: 2014 International Conference on Parallel, Distributed and Grid Computing, pp. 105–109. https://doi.org/10.1109/PDGC.2014.7030724
3. K. S and Nagarajan R. Secure framework data security using cryptography and steganography in Internet of Things. Multidisciplinary approach to modern digital steganography. Accessed: Jun. 22, 2022. [Online]. Available: https://www.igi-global.com/chapter/secure-framework-data-security-using-cryptography-and-steganography-in-internet-of-things/www.igi-global.com/chapter/secure-framework-data-security-using-cryptography-and-steganography-in-internet-of-things/280006
4. Subramanian, N., Elharrouss, O., Al-Maadeed, S., & Bouridane, A. (2021). Image steganography: A review of the recent advances. IEEE Access, 9, 23409–23423. https://doi.org/10.1109/ACCESS.2021.3053998
5. Shi, H., Zhang, X.-Y., Wang, S., Ge, Fu., & Tang, J. (2019). Synchronized detection and recovery of steganographic messages with adversarial learning. In J. M. F. Rodrigues, P. J. S. Cardoso, J. Monteiro, R. Lam, V. V. Krzhizhanovskaya, M. H. Lees, J. J. Dongarra, & P. M. A. Sloot (Eds.), Computational Science—ICCS 2019: 19th International Conference, Faro, Portugal, June 12–14, 2019, Proceedings, Part II (pp. 31–43). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-030-22741-8_3