共 68 条
- [1] Abbas NAF., 2022, INT J ELECT COMPUT E, V12, P2088
- [2] Abed Mohammed K., 2021, 2021 International Conference on Advanced Computer Applications (ACA), P199, DOI 10.1109/ACA52198.2021.9626807
- [3] ALabaichi A., 2020, Int. J. Electr. Comput. Eng., V10, P2088, DOI [10.11591/ijece.v10i1.pp935-946, DOI 10.11591/IJECE.V10I1.PP935-946]
- [4] Alatiyyat Bashayer Falah, 2022, 2022 2nd International Conference on Computing and Information Technology (ICCIT), P57, DOI 10.1109/ICCIT52419.2022.9711651
- [5] Alkhliwi S, 2023, ENG TECHNOL APPL SCI, V13, P10453
- [6] Image Steganography to Hide Unlimited Secret Text Size [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (04): : 73 - 82
- [7] Aslam Muhammad Adnan, 2022, 2022 2nd International Conference on Computing and Information Technology (ICCIT), P32, DOI 10.1109/ICCIT52419.2022.9711628
- [8] Bansal Kriti, 2020, 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI). Proceedings, P64, DOI 10.1109/ICOEI48184.2020.9142896
- [9] Bhavani Y., 2022, Intelligent Data Communication Technologies and Internet of Things: Proceedings of ICICI 2021. Lecture Notes on Data Engineering and Communications Technologies (101), P281, DOI 10.1007/978-981-16-7610-9_20
- [10] Bindu R. T., 2023, P INT CYB PHYS SYST, P365, DOI [10.1007/978-3-031-18497-0_28, DOI 10.1007/978-3-031-18497-0_28]