共 29 条
[1]
Kamal A.H.M., Islam M.M., Facilitating and securing offline e-medicine service through image steganography, Healthcare Technol. Lett, 1, 2, pp. 74-79, (2014)
[2]
Mishra D., Efficient and secure two-factor dynamic ID-based password authentication scheme with provable security, Cryptologia, 42, 2, pp. 146-175, (2018)
[3]
Brindha S., Vennila I., Hiding fingerprint in face using scattered LSB embedding steganographic technique for smart card based authentication system, Int. J. Comput. Appl, 26, 10, pp. 51-55, (2011)
[4]
Pang L., M-h S.U.N., S-S L., Wang B., Xin Y., Full privacy preserving electronic voting scheme, J. China Univ. Posts Telecommun, 19, 4, pp. 86-93, (2012)
[5]
Kamal A.H.M., Securing the smart card authentications process by embedment random number of data bits into each pixel, Int. J. u- and e-Serv. Sci. Technol, 10, 7, pp. 43-54, (2017)
[6]
Walker B.R., Colledge N.R., Ralston S.H., Penman I.D., Davidson’s principle and practice of medicine, pp. 170-176, (2014)
[7]
Alshamsi A., Andras P., User perception of Bitcoin usability and security across novice users, Int. J. Hum. Comput. Stud, 126, pp. 94-110, (2019)
[8]
Wang X.-T., Chang C.-C., Nguyen T.-S., Li M.-C., Reversible data hiding for high quality image exploiting interpolation and direction order mechanism, Digit. Signal Process, 23, 2, pp. 569-577, (2013)
[9]
Kamal A.H.M., Islam M.M., An image distortion-based enhanced embedding scheme, Iran J. Comput. Sci, 1, 3, pp. 175-186, (2018)
[10]
Nguyen T.-S., Chang C.-C., Huynh N.-T., A novel reversible data hiding scheme based on difference-histogram modification and optimal EMD algorithm, J. Vis. Commun. Image Represent, 33, pp. 389-397, (2015)