共 50 条
- [31] Performance enhanced image steganography systems using transforms and optimization techniques [J]. Multimedia Tools and Applications, 2017, 76 : 415 - 436
- [34] Achieving Data Integrity and Confidentiality Using Image Steganography and Hashing Techniques [J]. 2019 2ND INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2019, : 45 - 50
- [35] Novel and Secure Encoding and Hiding Techniques using Image Steganography: A Survey [J]. 2012 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ELECTRICAL ENGINEERING AND ENERGY MANAGEMENT (ICETEEEM - 2012), 2012, : 171 - 177
- [36] TECHNIQUES AND APPLICATIONS OF IMAGE UNDERSTANDING - INTRODUCTION [J]. PROCEEDINGS OF THE SOCIETY OF PHOTO-OPTICAL INSTRUMENTATION ENGINEERS, 1981, 281 : R7 - R7
- [37] FPGA Implementation of Image Steganography using Haar DWT and Modified LSB Techniques [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER APPLICATIONS (ICACA), 2016, : 26 - 31
- [38] Multi-image steganography and authentication using crypto-stego techniques [J]. Multimedia Tools and Applications, 2021, 80 : 29067 - 29093
- [39] A Novel Secure Image Steganography Using Improved Logistic Map and DNA Techniques [J]. JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (03): : 647 - 652
- [40] Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review [J]. PLOS ONE, 2024, 19 (09):