Author:
Kaushik Keshav,Bhardwaj Akashdeep
Subject
Law,General Computer Science
Reference8 articles.
1. ‘Adaptive batch size image merging steganography and quantized gaussian image steganography’;Sharifzadeh;IEEE Transactions on Information Forensics and Security,2020
2. ‘Crypto-based dual-phase hardware steganography for securing IP cores’;Sengupta;IEEE Letters of the Computer Society,2019
3. ‘A steganography method using neural networks’;Lopez-Hernandez;IEEE Latin America Transactions,2020
4. ‘Data hiding scheme based on features of Chinese text’;Lin,2011
5. ‘XML structure extraction from plain texts with Hidden Markov model’;Yong,2010
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Watermarking Text Documents With Watermarked Fonts;Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security;2024-06-24
2. Machine Learning-Based Detection of API Security Attacks;Lecture Notes in Networks and Systems;2024
3. Sobel Edges Key-Based Method for Steganography in Spatial Domain Images;2023 3rd International Conference on Mobile Networks and Wireless Communications (ICMNWC);2023-12-04
4. A Data Hiding Scheme via Reduced Difference Expansion to Improve the Stego Quality;2023 3rd International Conference on Mobile Networks and Wireless Communications (ICMNWC);2023-12-04
5. HTML Smuggling: Attack and Mitigation;2023 16th International Conference on Security of Information and Networks (SIN);2023-11-20