Author:
Ramalingam Mritha,Mat Isa Nor Ashidi,Puviarasi R.
Reference32 articles.
1. Secure medical data transmission model for IoT-based healthcare systems;Elhoseny;IEEE Access,2018
2. Das, R., & Das, I. (2016). "Secure data transfer in IoT environment: adopting both cryptography and steganography techniques". IEEE Second International Conference on Research in Computational Intelligence and Communication Networks, 296-301.
3. Yin, J.H.J., Fen, G.M., Mughal, F., & Iranmanesh, V. (2015). "Internet of Things: Securing Data using Image Steganography". IEEE International Conference on Artificial Intelligence, Modelling and Simulation, 310-314.
4. Encryption method based on a new secret key algorithm for color images;Zhou;AEU-International Journal of Electronics and Communications,2016
5. On the limits of steganography;Anderson;IEEE Journal on selected areas in communications,1998
Cited by
25 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An Adaptive Steganography Approach for Live Video Streams Based on Edge Analysis and Frame Variability;2023 International Conference on Recent Advances in Information Technology for Sustainable Development (ICRAIS);2023-11-06
2. Cloud Storage Confidentiality Using Knight Swarm Algorithm;2023 5th International Conference on Inventive Research in Computing Applications (ICIRCA);2023-08-03
3. Large-Capacity and Flexible Video Steganography via Invertible Neural Network;2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR);2023-06
4. A chaos-based novel approach to video encryption using dynamic S-box;Multimedia Tools and Applications;2023-05-09
5. A novel Sine–Tangent–Sine chaotic map and dynamic S-box-based video encryption scheme;The Imaging Science Journal;2023-03-19