Author:
Kannammal A.,Meena M. A.,Shalini S. K.,Jothish R. S.
Reference6 articles.
1. Chen RJ, Lai JL (2007) Image security system using recursive cellular automata substitution. Pattern Recogn 40:1621–1631
2. Garg N, Kaur K (2016) Hybrid information security model for cloud storage systems using hybrid data security scheme. Int Res J Eng Technol 3(4):2194–2196
3. Kasmani SA, Naghsh-Nilchi A (2008) A new robust digital image watermarking technique based onjoint DWT-DCT transformation. In: Convergence and hybrid information technology ICCIT’08 third international conference, vol 2, pp 539–544
4. Gupta AK, Raval MS. A robust and secure watermarking scheme based on singular values replacement. DhirubhaiAmbani Institute of Information and Communication Technology,Gandhinagar 382007, India
5. Razzaq MA, Shaikh RA (2017) Digital image security: fusion of encryption, steganography and watermarking. Int J Adv Comput Sci Appl 8(5)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献