[1]
|
A Feature-Based Coalition Game Framework with Privileged Knowledge Transfer for User-tag Profile Modeling
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining,
2023
DOI:10.1145/3580305.3599761
|
|
|
[2]
|
Image steganography using exploiting modification direction for compressed encrypted data
Journal of King Saud University - Computer and Information Sciences,
2022
DOI:10.1016/j.jksuci.2019.04.008
|
|
|
[3]
|
SABMIS: sparse approximation based blind multi-image steganography scheme
PeerJ Computer Science,
2022
DOI:10.7717/peerj-cs.1080
|
|
|
[4]
|
CSIS: Compressed sensing‐based enhanced‐embedding capacity image steganography scheme
IET Image Processing,
2021
DOI:10.1049/ipr2.12161
|
|
|
[5]
|
A Two-domain Data Hiding Scheme for Data Signature in Integrated Online Services Applications
Journal of Physics: Conference Series,
2021
DOI:10.1088/1742-6596/2137/1/012055
|
|
|
[6]
|
Proceedings of ICETIT 2019
Lecture Notes in Electrical Engineering,
2020
DOI:10.1007/978-3-030-30577-2_93
|
|
|
[7]
|
Modulus Calculations on Prime Number Algorithm for Information Hiding With High Comprehensive Performance
IEEE Access,
2020
DOI:10.1109/ACCESS.2020.2992690
|
|
|
[8]
|
Optimal steganography with blind detection based on Bayesian optimization algorithm
Pattern Analysis and Applications,
2019
DOI:10.1007/s10044-018-00773-0
|
|
|
[9]
|
Generalizing Hamming+k data hiding by overlapped pixels
Multimedia Tools and Applications,
2019
DOI:10.1007/s11042-018-7101-3
|
|
|
[10]
|
Improving capacity of Hamming (n,k)+1 stego-code by using optimized Hamming + k
Digital Signal Processing,
2018
DOI:10.1016/j.dsp.2018.03.016
|
|
|
[11]
|
A blind spatial domain-based image watermarking using texture analysis and association rules mining
Multimedia Tools and Applications,
2018
DOI:10.1007/s11042-018-6851-2
|
|
|
[12]
|
An Enhanced N-Pattern Hybrid Technique for Medical Images in Telemedicine
Procedia Computer Science,
2016
DOI:10.1016/j.procs.2016.03.040
|
|
|
[13]
|
Ethical Implications of the Snowden Revelations
The International Journal of Intelligence, Security, and Public Affairs,
2016
DOI:10.1080/23800992.2016.1196942
|
|
|