Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference48 articles.
1. Abraham A, Paprzycki M, et al (2004) Significance of steganography on data security. In: International conference on information technology: coding and computing, 2004. Proceedings. ITCC 2004, vol 2. IEEE, pp 347–351
2. Ashraf Z, Roy ML, Muhuri PK, Lohani QD (2020) Interval type-2 fuzzy logic system based similarity evaluation for image steganography. Heliyon 6(5):e03771
3. Atawneh S, Almomani A, Al Bazar H, Sumari P, Gupta B (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tool Appl 76(18):18451–18472
4. Balasubramanian C, Selvakumar S, Geetha S (2014) High payload image steganography with reduced distortion using octonary pixel pairing scheme. Multimed Tools Appl 73(3):2223–2245
5. Bhaumik A, Roy SK, Weber GW (2020) Hesitant interval-valued intuitionistic fuzzy-linguistic term set approach in prisoners’ dilemma game theory using topsis: a case study on human-trafficking. Cent Eur J Oper Res 28(2):797–816
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献