共 32 条
- [3] Anguraj S., 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT 2011), P205, DOI 10.1109/ICRTIT.2011.5972254
- [4] [Anonymous], CONCURRENCY COMPUTAT
- [5] Bandyopadhyay Samir Kumar, 2011, International Journal of Advanced Computer Science and Applications, V2, P129
- [6] Bansal T, 2013, INT J ADV RES COMPUT, V3, P26
- [7] A View on LSB Based Audio Steganography [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (02): : 51 - 62
- [8] Das R, 2016, 2016 SECOND IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (ICRCICN), P296, DOI 10.1109/ICRCICN.2016.7813674
- [9] Deogirikar J, 2017, 2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), P32, DOI 10.1109/I-SMAC.2017.8058363
- [10] Di Laura C, 2016, INT J DIGITAL MULTIM, V2016, P9