Author:
Kalaichelvi V.,Meenakshi P.,Vimala Devi P.,Manikandan H.,Venkateswari P.,Swaminathan S.
Publisher
Springer Science and Business Media LLC
Reference31 articles.
1. Amin MM, Salleh M, Ibrahim S, Katmin MR, Shamsuddin MZI (2003) Information hiding using steganography. In: 4th National Conference on Telecommunication Technology Proceedings, Shah Alam, Malaysia IEEE
2. Anathi M, Vijayakumar K (2020) Stock market analysis using candlestick regression and market trend prediction (CKRM). J Ambient Intell Hum Comput. https://doi.org/10.1007/s12652-020-01892-5
3. Anderson RJ, Peticolas FAP (1988) On the limits of steganography. IEEE J Sel Areas Comm
4. Artz D (2001) Digital steganography: hiding data within data. IEEE Int Comput 5:75–80
5. Cheddad A, Condell J, Curran K, McKevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90:727–752. https://doi.org/10.1016/j.sigpro.2009.08.010
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献