共 50 条
- [22] Using steganography techniques for implicit authentication to enhance sensitive data hiding [J]. INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2022, 13 (01): : 3973 - 3983
- [24] A Lossless Secret Image Sharing Scheme Based on Steganography [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 1247 - 1250
- [26] Web Authentication Security Using Image Steganography and AES Encryption [J]. 2018 INTERNATIONAL CONFERENCE ON INTELLIGENT AND INNOVATIVE COMPUTING APPLICATIONS (ICONIC), 2018, : 531 - 537
- [27] Digital Image Authentication Model Based on Edge Adaptive Steganography [J]. 2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 238 - 242
- [29] Image steganography Based on Chaos Permutation, Authentication and Wiener Deconvolution [J]. 2021 29TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2021, : 573 - 578
- [30] Novel Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography [J]. 2014 FIFTH INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT), 2014, : 101 - 106