共 31 条
[1]
Abikoye O., Adewole K., Oladipupo A., Efficient data hiding system using cryptography and steganography, (2012)
[2]
Aung P.P., A novel secure combination technique of steganography and cryptography, 2, 1, pp. 55-62, (2014)
[3]
Rashmi N., Jyothi K., An improved method for reversible data hiding steganography combined with cryptography, 2018 2nd International Conference on Inventive Systems and Control (ICISC), pp. 81-84, (2018)
[4]
Anuradha C., Secure and authenticated reversible data hiding in encrypted image, 3, 4, (2013)
[5]
Alrikabi H., Alaidi A.H., The Application of Wireless Communication in IOT for Saving Electrical Energy, 14, 1, pp. 152-160, (2020)
[6]
Bhatnagar G., Wu Q.J., Raman B.J.I.S., Discrete fractional wavelet transform and its application to multiple encryption, 223, pp. 297-316, (2013)
[7]
Study the Matching of the Level of Electromagnetic Radiation Emitted by Communication Towers in the Kut City with the International Health organization criterion, 4, 1, pp. 101-111, (2016)
[8]
Petitcolas F., Anderson R., Information Hiding-A Survey'Proceedings of the IEEE, 87, 7, pp. 1062-1078, (1999)
[9]
Rout H., Engineering C., Pros and cons of cryptography, steganography and perturbation techniques, pp. 76-81, (2014)
[10]
Chen C.P., Data-intensive applications, challenges, techniques and technologies: A survey on Big Data, 275, pp. 314-347, (2014)