共 10 条
[2]
Secret Sharing using 3 level DWT method of Image Steganography based on Lorenz Chaotic Encryption and Visual Cryptography
[J].
2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN),
2015,
:1147-1152
[3]
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[5]
Liu H., 2018, INT J DIGITAL CRIME
[7]
Sumathi C. P., 2014, ABS14015561 CORR
[8]
Thien CC, 2002, COMPUT GRAPH-UK, V26, P766
[9]
Chinese Remainder Theorem-Based Secret Image Sharing for (k, n) Threshold
[J].
CLOUD COMPUTING AND SECURITY, PT II,
2017, 10603
:433-440
[10]
Behavior Steganography in Social Network
[J].
ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1,
2017, 63
:21-23