共 50 条
- [1] Data Confidentiality Using Steganography and Cryptographic Techniques [J]. PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT ,POWER AND COMPUTING TECHNOLOGIES (ICCPCT), 2017,
- [3] Achieving an effective, confidentiality and integrity of data in cloud computing [J]. International Journal of Network Security, 2019, 21 (02): : 326 - 332
- [5] Data Integrity Mechanism Using Hashing Verification [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (09): : 94 - 98
- [6] Steganography and Classification of Image Steganography Techniques [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 870 - 875
- [7] A Review of Image Steganography Based on Multiple Hashing Algorithm [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (02): : 2463 - 2494
- [9] A Novel Coverless Steganography Method Based on Image Hashing [J]. Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2020, 40 (12): : 1302 - 1306