共 31 条
- [1] Abbasy Mohammad Reza, 2012, International Journal of New Computer Architectures and their Applications, V2, P183
- [2] Agrawal R, 2014, 2014 9TH INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (ICIIS), P35
- [4] Amal K., 2015, British Journal of Mathematics Computer Science, V11, P1, DOI DOI 10.9734/BJMCS/2015/19561
- [5] Amritha PP, 2011, CYBER SECURITY, CYBER CRIME AND CYBER FORENSICS: APPLICATIONS AND PERSPECTIVES, P250, DOI 10.4018/978-1-60960-123-2.ch018
- [6] [Anonymous], 2017, 2017 4 INT C ADV COM, DOI DOI 10.1109/ICACCS.2017.8014670
- [7] [Anonymous], 2013, INT J COMPUTER SCI E
- [8] Atito A., 2012, J Commun Comput Eng, V2, P44, DOI DOI 10.20454/jcce.2012.242
- [9] Chakraborty M. S., 2015, INT J ADV INFORM SCI, V44, P44
- [10] Analysis of various data security techniques of steganography: A survey [J]. INFORMATION SECURITY JOURNAL, 2021, 30 (02): : 63 - 87