Author:
Harshini Kovuri,Naresh Bandla,Sahitya Kutumbaka,Satya Vara Prasad B. B. V.,Dasu Batti Tulasi
Publisher
Springer Nature Singapore
Reference16 articles.
1. Soujanya, K.L.S.: Ontology based variability management for dynamic reconfiguration of software product lines. J. Adv. Res. Dyn. Control Syst. 9(Special Issue 18), 2361–2375 (2018)
2. Narayana, V.A., Chamakura, A., Gandi, R.: Deceptive call recognition in a network using machine learning. Acta Technica CSAV (Ceskoslovensk Akademie Ved), 63(6), 909–914 (2018)
3. Singhal, V., Kumar Shukla, Y., Prakash, N.: Image steganography embedded with advance encryption standard (AES) securing with SHA-256. Int. J. Innov. Technol. Expl. Eng. (IJITEE) (2020)
4. Hybrid approach to text and image steganography using AES and LSB technique. Int. Res. J. Eng. Technol. (IRJET) (2018)
5. Malathi, M., Rahul, M., Kumar, N.S., Thamaraiselvan, R.: Enhanced image steganography using AES and SPIHT compression. In: 2017 international conference on innovations in information embedded and communication systems (ICIIECS) (2017)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献