Publisher
Springer Science and Business Media LLC
Reference25 articles.
1. Almuhammadi, S., Al-Shaaby, A.: A survey on recent approaches combining cryptography and steganography 63–74 (2017). https://doi.org/10.5121/csit.2017.70306.
2. Radanliev, P., De Roure, D., Cannady, S., Montalvo, R. M., Nicolescu, R., Huth, M.: Economic impact of IoT cyber risk—Analysing past and present to predict the future developments in IoT risk analysis and IoT cyber insurance. IET Conf. Publ., CP740, 2019 (2018). https://doi.org/10.1049/cp.2018.0003.
3. Alanizy, N., Alanizy, A., Baghoza, N., Alghamdi, M., Gutub, A.: 3-Layer PC text security via combining compression, AES cryptography 2LSB image steganography. J. Res. Eng. Appl. Sci. 3(04), 118–124 (2018)
4. Gutub, A. A., Fattani, M. M.: A novel Arabic text steganography method using letter points and extensions. Eng. Technol. 28–31 (2007).
5. Alifah Roslan, N., Izura Udzir, N., Mahmod, R., Gutub, A.: Systematic literature review and analysis for Arabic text steganography method practically, Egypt. Inf. J. 23(4), 177–191 (2022). https://doi.org/10.1016/j.eij.2022.10.003
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献