[1]
|
A Modulo Function-Based Robust Asymmetric Variable Data Hiding Using DCT
Symmetry,
2020
DOI:10.3390/sym12101659
|
|
|
[2]
|
Reversible-Enhanced Stego Block Chaining Image Steganography: A Highly Efficient Data Hiding Technique
Canadian Journal of Electrical and Computer Engineering,
2020
DOI:10.1109/CJECE.2019.2938844
|
|
|
[3]
|
Column Level Image Authentication Technique using Hidden Digital Signatures
2018 24th International Conference on Automation and Computing (ICAC),
2018
DOI:10.23919/IConAC.2018.8748967
|
|
|
[4]
|
A Novel Technique for Image Super Resolution Based on Sparse Representations and Compact Entity Extraction
2018 24th International Conference on Automation and Computing (ICAC),
2018
DOI:10.23919/IConAC.2018.8749108
|
|
|
[5]
|
Dual lossless compression based image steganography for low data rate channels
2017 International Conference on Communication Technologies (ComTech),
2017
DOI:10.1109/COMTECH.2017.8065751
|
|
|
[6]
|
Enhanced stego block chaining (ESBC) for low bandwidth channels
Security and Communication Networks,
2016
DOI:10.1002/sec.1769
|
|
|
[7]
|
Varying index varying bits substitution algorithm for the implementation of VLSB steganography
Journal of the Chinese Institute of Engineers,
2016
DOI:10.1080/02533839.2015.1082933
|
|
|
[8]
|
5LSB steganogaraphyusing monotonie RGB color image as cover medium
2016 Sixth International Conference on Innovative Computing Technology (INTECH),
2016
DOI:10.1109/INTECH.2016.7845023
|
|
|
[9]
|
Enhanced stego block chaining (ESBC) for low bandwidth channels
Security and Communication Networks,
2016
DOI:10.1002/sec.1769
|
|
|
[10]
|
A secure true edge based 4 least significant bits steganography
2015 International Conference on Emerging Technologies (ICET),
2015
DOI:10.1109/ICET.2015.7389227
|
|
|
[11]
|
Wrinkles energy based age estimation using discrete cosine transform
2015 International Conference on Emerging Technologies (ICET),
2015
DOI:10.1109/ICET.2015.7389184
|
|
|