has been cited by the following article(s):
[1]
|
Intelligent Techniques in Signal Processing for Multimedia Security
Studies in Computational Intelligence,
2017
DOI:10.1007/978-3-319-44790-2_1
|
|
|
[2]
|
Reversible Data Hiding Method Based on Exclusive-Or with Two Host Images
2014 International Conference on Trustworthy Systems and their Applications,
2014
DOI:10.1109/TSA.2014.20
|
|
|
[3]
|
The Survey on Applications of Information Hiding Technology in E-Commerce Security
Applied Mechanics and Materials,
2013
DOI:10.4028/www.scientific.net/AMM.433-435.1866
|
|
|
[4]
|
Data Encrypting in a Binary Image Base on Modified Data Hiding Method
2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing,
2011
DOI:10.1109/IIHMSP.2011.78
|
|
|
[5]
|
A weight-based data hiding method for binary image using selective binary numeral system
Journal of Discrete Mathematical Sciences and Cryptography,
2010
DOI:10.1080/09720529.2010.10698305
|
|
|