Author:
Gull Solihah,Loan Nazir A.,Parah Shabir A.,Sheikh Javaid A.,Bhat G. M.
Publisher
Springer Science and Business Media LLC
Reference36 articles.
1. Aljuaid NA, Gutub AA, Khan EA (2018) Enhancing PC data security via combining RSA cryptography and video based steganography. J Inform Secur Cybercrimes Res (JISCR) 1(1):8–18
2. Almazrooie M, Samsudin A, Gutub AA, Salleh MS, Omar MA, Hassan SA (2018) Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. J King Saud Univ Comput Inform Sci Elsevier.
https://doi.org/10.1016/j.jksuci.2018.02.006
3. Ansari IA, Pant M, Ahn CW (2015) Svd based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7(6):1225–1239
4. Azeroual A, Afdel K (2017) Real-time image tamper localisation based on fragile watermarking and Faber-Schauder wavelet. Int J Commun (AEÜ) 79:207–218
5. Caragata D, Assad SE, Luduena M (2015) An improved fragile watermarking algorithm for jpeg images. Int J Electron Commun 69(12):1783–1794
Cited by
82 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献