Publisher
Springer Nature Singapore
Reference19 articles.
1. Li B, He J, Huang J, Shi YQ (2011) A survey on image steganography and steganalysis. J Inf Hiding Multimed Signal Process 2(2):142–172. 10.1.1.648.4107
2. Mishra R, Bhanodiya P (2015) A review on steganography and cryptography. In: 2015 International Conference on Advances in Computer Engineering and Applications, pp 119–122. https://doi.org/10.1109/ICACEA.2015.7164679
3. Zhang KA, Cuesta-Infante A, Xu L, Veeramachaneni K (2019) SteganoGAN: high capacity image steganography with GANs. arXiv:1901.03892 [cs, stat]
4. Heaton J (2018) Ian goodfellow, yoshua bengio, and aaron courville: deep learning. Genet Program Evol Mach 19:305–307. https://doi.org/10.1007/s10710-017-9314-z
5. Soleymani A, Nordin MJ, Ali ZM (2013) A novel public key image encryption based on elliptic curves over prime group field. JOIG 1(1):43–49. https://doi.org/10.12720/joig.1.1.43-49