Author:
Jana Sunanda,Maji Arnab Kumar,Pal Rajat Kumar
Publisher
Springer Science and Business Media LLC
Reference24 articles.
1. Ali S, Guo X, Karri R, Mukhopadhyay D (2016) Fault attacks on AES and their countermeasures. In: Secure system design and trustable computing, book part: part I, pp 163–208
2. Bhaumik J, Roy Chowdhury D (2009) NMIX: an ideal candidate for key mixing. In: Proceedings of the international conference on security and cryptography, pp 285–288
3. Chang C-C, Lin P-Y, Wang ZH, Li MC (2010) A Sudoku based secret image sharing scheme with reversibility. J Commun 5(1):5–12
4. Choudry KN, Wanjari A (2015) A survey paper on video steganography. Int J Comput Sci Inf Technol 6(3):2335–2338
5. Cox IJ, Kilian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. In: Proceedings of IEEE image processing, pp 135–149
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献