Author:
Hyma J.,Sudamalla Moulica,Vanaparthi Dharma Teja,Vinnakota Koushik,Choppavarapu Vamsi Krishna
Reference12 articles.
1. Nawaz, S., Adib, M., Nawaz, M., Kamran, R.: Identifying and analyzing security threats to virtualized cloud computing infrastructures. In: Proceedings of IEEE International Conference on Cloud Computing Technologies, Applications and Managements, pp. 151–155 (2012)
2. Karthikeyan, B., Deepak, A., Subalakshmi, K.S., Anishin Raj, M.M., Vaithiyanathan, V.: A combined approach of steganography with LSB encoding technique and DES algorithm. In: Proceedings of 3rd International Conference on Advances in Electrical, Electronics, Information, Communication and Bioinformatics (2017)
3. Ranjan, A., Bhonsle, M.: Advanced technics to shared protect cloud data using multilayer steganography and cryptography. In: Proceedings of IEEE International Conference on Automatic Control and Dynamic Optimization Techniques (2016)
4. Singh, A., Singh, H.: An improved LSB based image steganography technique for RGB color images. In: Proceedings of IEEE International Conference on Electrical, Computer and Communication Technologies, pp. 1–4 (2015)
5. Nicole, R.: Title of paper with only first word capitalized. J. Name Stand. Abbrev. (in press)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献