Author:
Hussain Hanizan Shaker,Din Roshidi,Samad Hafiza Abdul,Yaacub Mohd Hanafizah,Murad Roslinda,A. Rukhiyah,Sabdri Noor Maizatulshima
Reference37 articles.
1. L. Chang, Issues in Information Hiding Transform Techniques, Naval Research Lab Washington DC Center for Computer High Assurance System, (2002).
2. A. Cheddad, J. Condell, K. Curran, and P. Kevitt, Digital Image Steganography: Survey and Analysis of Current Methods, Journal of Signal Processing, (2010).
3. Y.G. Fu, Reliable Information Hiding Based on Support Vector Machine, INFORMATICA, 2005, Vol. 16, No. 3, 333–346, (2005).
4. T. Morkel, J.H.P. Eloff, and M.S. Olivier, An Overview of Image Steganography, Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, (2005).
5. S. Venkatraman, A. Abraham, and M. Paprzycki, Significance of Steganography on Data Security, IEEE Proceedings of the International Conference on Information Technology: Coding & Computing, (2004).
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Review of Unsupervised Adaptive Resonance Theory;2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence);2019-01