Author:
ASLANTAŞ Funda,HANİLÇİ Cemal
Publisher
Bursa Technical University
Reference20 articles.
1. [1] Alp, H., Akıncı, T. Ç., Albora, M. (2008). Comparıson Of Fourier And Wavelet Transforms In Geophysical Applicatıons, Journal Of Engineerıng Sciences, 14 (1), 67-76.
2. [2] Bender, W., Gruhl, D., Morimoto, N., Lu, A. (1996). Techniques for data hiding, IBM Systems Journal 313-336. doi: 10.1147/sj.353.0313.
3. [3] Bhavana, D., Tej, D.R., Puneeth, M., Harini, A., Shankar, Y.M., Madhuri, T.S. (2015). Steganography Using Matlab, International Journal of Advanced Engineering Research and Science (IJAERS) 19-24. doi:10.22161/ijaers.
4. [4] Chun-lin L. A tutorial of the wavelet transform; 2010.
5. [5] Cvejic, N., Seppänen, T. (2003). Increasing the capacity of LSB-based audio steganography, IEEE Workshop on Multimedia Signal Processing, 336-338. doi: 10.1109/MMSP.2002.1203314.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Steganography and its Feasible Approaches for Computer Network Security;2023 International Conference on Communication, Security and Artificial Intelligence (ICCSAI);2023-11-23