Author:
Bala Krishnan R.,Rajesh Kumar N.,Raajan N. R.,Manikandan G.,Srinivasan A.,Narasimhan D.
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference39 articles.
1. Schneier, B. (2007). Applied cryptography protocols (2 ed.). Algorithm and source code in C. Wiley India Edition.
2. Bender, W., Butera, W., Gruhl, D., Hwang, R., Paiz, F. J., & Pogreb, S. (2000). Applications for data hiding. IBM Systems Journal, 39(3 & 4), 547–568
3. Bender, W., Gruhl, D., Morimoto, N., & Lu, A. (1996). Techniques for data hiding. IBM Systems Journal, 35(3 & 4), 313–336
4. Chan, C. K., & Chen, L. M. (2004). Hiding data in images by simple LSB substitution. Pattern Recognition, 37(3), 469–474
5. Narayanan, P., Sengan, S., Pudhupalayam Marimuthu, B., et al. (2021). Analysis and design of fuzzy-based manoeuvring model for mid-vehicle collision avoidance system. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-020-02737-x
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献