Author:
Verma Vikas,Poonam ,Chawla Rishma
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Comparative Analysis of Image Steganography Techniques in Spatial and Transform Domains;2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech);2023-11-14
2. Spatial-Based 2D Image Steganography using Josephus-Traversing Concentric Midpoint Circle Algorithm;2023 10th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI);2023-09-20
3. Highly Secured Steganography Method for Image Communication using Random Byte Hiding and Confused & Diffused Encryption;Computer Networks and Inventive Communication Technologies;2021-09-14
4. Information hiding scheme for digital images using difference expansion and modulus function;Journal of King Saud University - Computer and Information Sciences;2019-07
5. An Improved Approach for Securing Document Images Using Dual Cover;Advances in Intelligent Systems and Computing;2017-09-27