共 123 条
- [91] Sharma S., 2016, PROC 2 INT C INF COM, P1
- [92] Sharp A, 2013, 2013 IEEE INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING APPLICATIONS (IEEE ICSIPA 2013), P182, DOI 10.1109/ICSIPA.2013.6708000
- [93] ShengDun Hu, 2011, Proceedings of the 2011 IEEE 14th International Conference on Computational Science and Engineering (CSE 2011). 11th International Symposium on Pervasive Systems, Algorithms, Networks (I-SPAN 2011). 10th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2011), P57, DOI 10.1109/CSE.2011.24
- [94] Shyla N., 2021, AUGMENTATION NOVEL A, V5110
- [95] Singh A., 2015, PROC IEEE INT C ELEC, P1
- [97] A hybrid steganography technique based on RR, AQVD, and QVC [J]. INFORMATION SECURITY JOURNAL, 2022, 31 (04): : 479 - 498