Author:
Kumar D.,Sudha V. K.,Manikandan N.,Ramaswamy Krishnaraj
Publisher
Springer Science and Business Media LLC
Reference34 articles.
1. Khan, A. & Sarfaraz, A. Vetting the security of mobile applications. Sci. Int. 29(2), 361–365 (2017).
2. Khan, A. Comparative analysis of watermarking techniques. Sci. Int. 27(6), 6091–6096 (2015).
3. Stallings, W. Cryptography and network security: principles and practice 3rd edn. (PHI, Delhi, 2006).
4. Kacar, S. et al. 4D chaotic system-based secure data hiding method to improve robustness and embedding capacity of videos. J. Inf. Secur. Appl. 71, 103369. https://doi.org/10.1016/j.jisa.2022.103369 (2022).
5. Darani, A. Y. et al. Optimal location using genetic algorithms for chaotic image steganography technique based on discrete framelet transform. Digit. Signal Process. 144, 104228. ISSN 1051-2004. https://doi.org/10.1016/j.dsp.2023.104228 (2024).