Author:
Almuhammadi Sultan,Al-Shaaby Ahmed
Publisher
Academy & Industry Research Collaboration Center (AIRCC)
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Customized model for text cryptography using hybrid image-key;Signal, Image and Video Processing;2024-05-22
2. Strengthening Data Security of India using a mixed approach of Cryptography and Steganography Techniques: A Review;2023 International Conference on Device Intelligence, Computing and Communication Technologies, (DICCT);2023-03-17
3. An Approach Towards Data Security Based on DCT and Chaotic Map;2022 2nd Asian Conference on Innovation in Technology (ASIANCON);2022-08-26
4. A Review on Different Encryption and Decryption Approaches for Securing Data;Advances in Information Security, Privacy, and Ethics;2022-06-30
5. A Brief Review on Various Aspects of Steganography Followed by Cryptographic Analysis;2022 IEEE 7th International conference for Convergence in Technology (I2CT);2022-04-07