[1]
|
Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics
Advances in Information Security, Privacy, and Ethics,
2019
DOI:10.4018/978-1-5225-7492-7.ch026
|
|
|
[2]
|
Quantum Computing:An Environment for Intelligent Large Scale Real Application
Studies in Big Data,
2018
DOI:10.1007/978-3-319-63639-9_20
|
|
|
[3]
|
Encyclopedia of Information Science and Technology, Fourth Edition
2018
DOI:10.4018/978-1-5225-2255-3.ch432
|
|
|
[4]
|
Computer Vision
2018
DOI:10.4018/978-1-5225-5204-8.ch007
|
|
|
[5]
|
A Multiple Criteria-Based Cost Function Using Wavelet and Edge Transformation for Medical Image Steganography
Journal of Intelligent Systems,
2018
DOI:10.1515/jisys-2016-0095
|
|
|
[6]
|
A Novel Multiplicative Steganography Technique in Contourlet Domain
2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC),
2017
DOI:10.1109/ISCISC.2017.8488376
|
|
|
[7]
|
Steganalysis based on steganography pattern discovery
Journal of Information Security and Applications,
2016
DOI:10.1016/j.jisa.2016.04.001
|
|
|
[8]
|
A new steganographic method using Contourlet Transform
2016 International Conference on Signal Processing and Communication (ICSC),
2016
DOI:10.1109/ICSPCom.2016.7980590
|
|
|
[9]
|
Colour image steganography method based on sparse representation
IET Image Processing,
2015
DOI:10.1049/iet-ipr.2014.0351
|
|
|
[10]
|
Detection of Stego-Images in Communication among the Terrorist Boko-Haram Sect in Nigeria
Journal of Data Analysis and Information Processing,
2015
DOI:10.4236/jdaip.2015.34017
|
|
|
[11]
|
Information Security in Diverse Computing Environments
Advances in Information Security, Privacy, and Ethics,
2014
DOI:10.4018/978-1-4666-6158-5.ch013
|
|
|
[12]
|
Current status and key issues in image steganography: A survey
Computer Science Review,
2014
DOI:10.1016/j.cosrev.2014.09.001
|
|
|
[13]
|
A Novel Image Steganography in Contourletdomain Using Genetic Algorithm
International Journal of Future Computer and Communication,
2013
DOI:10.7763/IJFCC.2013.V2.185
|
|
|
[14]
|
CBS: Contourlet-Based Steganalysis Method
Journal of Signal Processing Systems,
2010
DOI:10.1007/s11265-010-0460-2
|
|
|