共 50 条
- [11] Optimizing Cryptographically based Security in Wireless Networks 2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2015, : 39 - 45
- [13] Performance analysis of medical image security using steganography based on fuzzy logic CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : S3285 - S3291
- [14] Performance analysis of medical image security using steganography based on fuzzy logic Cluster Computing, 2019, 22 : 3285 - 3291
- [16] Data Link Layer Security Protocols in Wireless Sensor Networks: A Survey 2013 10TH IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2013, : 312 - 317
- [17] A Hybrid Approach for Image Security by Combining Encryption and Steganography 2013 IEEE SECOND INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2013, : 607 - 611
- [18] Substitution Steganography with Security Improved by Chaotic Image Encryption 2017 IEEE 14TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATICS, 2017, : 284 - 288
- [20] AdvSGAN: Adversarial image Steganography with adversarial networks Multimedia Tools and Applications, 2021, 80 : 25539 - 25555