共 24 条
[1]
Aliyu A., 2023, Data Security Using Steganography, DOI [10.5281/zenodo.7607083, DOI 10.5281/ZENODO.7607083]
[2]
Blind image-variant based authentication method
[J].
MULTIMEDIA TOOLS AND APPLICATIONS,
2023, 83 (17)
:51899-51923
[3]
Information hiding using steganography
[J].
4TH NATIONAL CONFERENCE ON TELECOMMUNICATION TECHNOLOGY, PROCEEDINGS,
2003,
:21-25
[6]
Integrity Verification in Medical Image Retrieval Systems using Spread Spectrum Steganography
[J].
ICMR'19: PROCEEDINGS OF THE 2019 ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA RETRIEVAL,
2019,
:53-57
[7]
Forgac R., 2021, IEEE Xplore
[8]
Ghosh Bibek Ranjan, 2023, Lecture notes in networks and systems, P147, DOI [10.1007/978-981-99- 4433-0_13, DOI 10.1007/978-981-99-4433-0_13]
[9]
Hashim Mohammed Mahdi, 2020, IOP Conference Series: Materials Science and Engineering, V881, DOI [10.1088/1757-899x/881/1/012120, 10.1088/1757-899X/881/1/012120]
[10]
Jaiswal S, 2023, International Journal for Research in Applied Science and Engineering Technology, V11, P3941, DOI [10.22214/ijraset.2023.52462, 10.22214/ijraset.2023.52462, DOI 10.22214/IJRASET.2023.52462]