共 50 条
- [1] Review On Cryptography and Steganography Techniques in Video [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC 2018), 2018, : 30 - 33
- [3] Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-Based Cryptography, and Chaotic Cryptography Techniques [J]. IEEE ACCESS, 2024, 12 : 75146 - 75168
- [5] Secure Data Transfer in IoT environment: adopting both Cryptography and Steganography techniques [J]. 2016 SECOND IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (ICRCICN), 2016, : 296 - 301
- [7] A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography [J]. Wireless Personal Communications, 2023, 129 : 2291 - 2318
- [8] A Secure Data Hiding Scheme Based on Combined Steganography and Visual Cryptography Methods [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 498 - 505
- [9] A Review on Steganography and Cryptography [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 119 - 122