共 49 条
[1]
Zhou W., Jia Y., Peng A., Zhang Y., Liu P., The effect of IOT new features on security and privacy: new threats, existing solutions, and challenges yet to be solved, IEEE Internet Things J, 6, 2, pp. 1606-1616, (2018)
[2]
Qian Z., Choo K.K.R., Cogranne R., Zhang X., Multimedia security: Novel steganography and privacy preserving [Editorial], Secur Commun Networks, 2018, pp. 1-2, (2018)
[3]
Catak F.O., Mustacoglu A.F., CPP-ELM: Cryptographically privacy-preserving extreme learning machine for cloud systems, Int J Comput Intell Syst, 11, 1, pp. 33-44, (2018)
[4]
Kadhim I.J., Premaratne P., Vial P.J., Halloran B., Comprehensive survey of image steganography: techniques, evaluations, and trends in future research, Neurocomputing, 335, 2019, pp. 299-326, (2019)
[5]
Thangadurai K., Devi G.S., An analysis of LSB based image steganography technique, 2014 International Conference on Computer Communication and Informatics (ICCCI), pp. 1-4, (2014)
[6]
Zielinska E., Mazurczyk W., Szczypiorski K., Trends in steganography, Commun ACM, 57, 3, pp. 86-95, (2014)
[7]
Bhattacharyya S., Banerjee I., Sanyal G., A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier, J Glob Res Comput Sci, 2, 4, pp. 1-16, (2011)
[8]
Hussain M., Wahab A.W.A., Idris Y.I.B., Ho A.T., Jung K.H., Image steganography in spatial domain: a survey, Signal Process Image Commun, 65, pp. 46-66, (2018)
[9]
Jiang S., Ye D., Huang J., Shang Y., Zheng Z., SmartSteganogaphy: light-weight generative audio steganography model for smart embedding application, J Netw Comput Appl, 165, pp. 1-7, (2020)
[10]
Baawi S.S., Mokhtar M.R., Sulaiman R., A comparative study on the advancement of text steganography techniques in digital media, ARPN J Eng Appl Sci, 13, 5, pp. 1854-1863, (2018)