共 50 条
- [31] Analysis of various data security techniques of steganography: A survey [J]. INFORMATION SECURITY JOURNAL, 2021, 30 (02): : 63 - 87
- [32] Combined Cryptography and Steganography for Enhanced Security in Suboptimal Images [J]. 2020 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SIGNAL PROCESSING (AISP), 2020,
- [33] Enhancing Security of Transmitted Data by Improved Steganography Method [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (04): : 239 - 244
- [34] Three Step Data Security Model for Cloud Computing based on RSA and Steganography Techniques [J]. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, : 490 - 494
- [35] An ensemble of monarchy butterfly optimization based encryption techniques on image steganography for data hiding in thermal images [J]. Multimedia Tools and Applications, 2023, 82 : 47235 - 47252
- [36] Security techniques using Enhancement of AES Encryption [J]. PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS), 2018, : 468 - 472
- [38] Vehicle Security Encryption Based on Unlicensed Encryption [J]. MIPPR 2017: REMOTE SENSING IMAGE PROCESSING, GEOGRAPHIC INFORMATION SYSTEMS, AND OTHER APPLICATIONS, 2018, 10611
- [40] Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption [J]. Multimedia Tools and Applications, 2019, 78 : 31467 - 31484