Author:
Seuti Tasfia,Al Mamun Md.,Sarowar Sattar A. H. M.
Reference20 articles.
1. Uddin MP, Marjan MA, Sadia N, Islam MR (2014) Developing a cryptographic algorithm based on ASCII conversions and a cyclic mathematical function. In: 2014 international conference on informatics, electronics & vision (ICIEV). IEEE Press, pp 1–5
2. Kutte M, Hartung JF (1999) Information hiding-a survey. In: Proceedings of The IEEE: special issue on identification and protection of multimedia content, vol 87, no 7, pp 1062–1078
3. Uddin MP, Saha M, Ferdousi SJ, Afjal MI, Marjan MA (2014) Developing an efficient solution to information hiding through text steganography along with cryptography. In: 2014 9th international forum on strategic technology (IFOST), pp 14–17
4. Islam MR, Siddiqa A, Uddin MP, Mandal AK, Hossain MD (2014) An efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography. In: 2014 international conference on informatics, electronics vision (ICIEV), pp 1–6
5. Sultana S, Khanam A, Islam MR, Nitu AM, Uddin MP, Afjal MI, Rabbi MF (2018) A modified filtering approach of LSB image steganography using stream builder along with AES encryption. HBRP recent trends in information technology and its applications 1(1):1–10