共 48 条
[1]
Agrawal S, 2016, 2016 IEEE STUDENTS' CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER SCIENCE (SCEECS)
[2]
Al-Juaid N.A., 2018, J Inf Secur Cybercrimes Res (JISCR), V1, P8, DOI [10.26735/16587790.2018.006, DOI 10.26735/16587790.2018.006]
[3]
Combining RSA and audio steganography on personal computers for enhancing security
[J].
SN APPLIED SCIENCES,
2019, 1 (08)
[4]
Trustworthy image security via involving binary and chaotic gravitational searching within PRNG selections
[J].
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY,
2020, 20 (12)
:167-176
[5]
Al-Shaarani F., 2020, RAS Eng Technol, V1, P1, DOI DOI 10.21070/JIHR.V12I2.985