共 53 条
[1]
Alabaichi A., 2020, INT J ELECT COMPUTER, V10, P935, DOI DOI 10.11591/IJECE.V10I1.PP935-946
[4]
Anisimova ES, 2014, Collection of Scientific Works Sworld, V6, P69
[5]
[Anonymous], 2006, 2006 IEEE REG 5 C IE, DOI DOI 10.1109/TPSD.2006.5507412
[6]
[Anonymous], 2014, International Journal of Innovative Research in Computer and Communication Engineering
[8]
Bandyopadhyay D, 2014, INT J SECURITY PRIVA, V3, P11
[9]
Secret Sharing using 3 level DWT method of Image Steganography based on Lorenz Chaotic Encryption and Visual Cryptography
[J].
2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN),
2015,
:1147-1152
[10]
Chang CC, 2005, AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, P83