共 50 条
- [1] Achieving Data Integrity and Confidentiality Using Image Steganography and Hashing Techniques [J]. 2019 2ND INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2019, : 45 - 50
- [4] Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme [J]. PLOS ONE, 2023, 18 (02):
- [5] A Cryptographic Approach for Steganography [J]. 2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 518 - 521
- [6] Cryptographic Techniques for Data Processing [J]. PROCEEDINGS OF THE 5TH JOINT INTERNATIONAL CONFERENCE ON DATA SCIENCE & MANAGEMENT OF DATA, CODS COMAD 2022, 2022, : 344 - 347
- [7] Efficient Image Steganography Using Adaptive Cryptographic Algorithms [J]. INTELLIGENT COMPUTING, VOL 1, 2019, 858 : 558 - 568
- [8] Data Hiding in Images Using Some Efficient Steganography Techniques [J]. SIGNAL PROCESSING, IMAGE PROCESSING AND PATTERN RECOGNITION, 2011, 260 : 195 - 203
- [9] Securing AI Systems: A Comprehensive Overview of Cryptographic Techniques for Enhanced Confidentiality and Integrity [J]. 2024 13TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING, MECO 2024, 2024, : 250 - 257
- [10] Encryption Techniques for Cloud Data Confidentiality [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (04): : 11 - 20