共 60 条
[1]
Arabic Text Steganography Based on Deep Learning Methods
[J].
IEEE ACCESS,
2022, 10
:94403-94416
[2]
Akhtar Nadeem, 2013, 2013 5th International Conference on Computational Intelligence and Communication Networks (CICN), P385, DOI 10.1109/CICN.2013.85
[3]
Al-Husainy MAF, 2012, INT J ADV COMPUT SC, V3, P57
[4]
Al-Yousuf FQA, 2020, Indonesian Journal of Electrical Engineering and Computer Science, V17, P1053, DOI 10.11591/ijeecs.v17.i2.pp1053-1058
[5]
Alabdali N., 2021, Int. J. Sci. Eng. Sci, V5, P41
[6]
Amirtharajan R., 2010, INT J COMPUT APPL, V2, P41
[7]
Ansari AS, 2020, International Journal of Engineering Research and Technology, V13, P345, DOI [10.37624/ijert/13.2.2020.345-354, 10.37624/IJERT/13.2.2020.345-354, DOI 10.37624/IJERT/13.2.2020.345-354]
[8]
A New Method to Estimate Peak Signal to Noise Ratio for Least Significant Bit Modification Audio Steganography
[J].
PERTANIKA JOURNAL OF SCIENCE AND TECHNOLOGY,
2022, 30 (01)
:497-511
[9]
Baluja S, 2017, ADV NEUR IN, V30
[10]
ENCRYPTION IN EDGAR ALLAN POE'S FICTION: A TRANSACTIONAL READING OF SECRET WRITING
[J].
BRITISH AND AMERICAN STUDIES,
2022, 28
:97-104