has been cited by the following article(s):
[1]
|
Impact of various image formats supported by android smartphones on image steganography: a preliminary study
|
|
Multimedia Tools and Applications,
2024 |
|
|
[2]
|
PIRAP: Chaotic fuzzy encryption (CFE) technique and greedy chemical reaction optimization (GCRO) algorithm-based secured mobi-cloud framework
|
|
International Journal …,
2023 |
|
|
[3]
|
A dynamic four-step data security model for data in cloud computing based on cryptography and steganography
|
|
Sensors,
2022 |
|
|
[4]
|
Enhancing Data Security for Sharing Personalized Data in Mobile Cloud Environments
|
|
… Technologies for Big Data and Cloud …,
2022 |
|
|
[5]
|
Android based Digital Steganography Application using LSB and PSNR Algorithm in Mobile Environment
|
|
2021 |
|
|
[6]
|
Enhancing the Security of Mobile Cloud Computing using Audio Steganography with Least Significant Bit Insertion
|
|
International Journal of Engineering Research & Technology,
2021 |
|
|
[7]
|
E-university cloud information security issues
|
|
2020 |
|
|
[8]
|
Steganographic approach to enhance the data security in public cloud
|
|
2020 |
|
|
[9]
|
Application of Steganography Technique in Cloud Computing
|
|
2019 |
|
|
[10]
|
Hybrid design for cloud data security using combination of AES, ECC and LSB steganography
|
|
2019 |
|
|
[11]
|
Research on cloud computing-based power security management software
|
|
2019 |
|
|
[12]
|
Enhancing Cloud Computing Security using Cryptography & Steganography
|
|
2019 |
|
|
[13]
|
Enhancing Cloud Computing Security using Cryptography & Steganography.
|
|
Iraqi Journal of Information Technology,
2019 |
|
|
[14]
|
Security and Compliance Management in Cloud Computing
|
|
2018 |
|
|
[15]
|
A Hybrid Multi-Stage Methodology for Secure Outsourcing of Confidential Data to Public Cloud
|
|
2018 |
|
|
[16]
|
Mobile Cloud Computing Security Frameworks: A Review
|
|
Cloud Computing Technologies for Green Enterprises,
2018 |
|
|
[17]
|
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challenges
|
|
International Research Journal of Engineering and Technology,
2017 |
|
|
[18]
|
Secret digital images over cloud computing using meaningful secret sharing technique
|
|
2017 |
|
|
[19]
|
An Enhanced Data Integrity Model In Mobile Cloud Environment Using Digital Signature Algorithm And Robust Reversible Watermarking
|
|
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH,
2017 |
|
|
[20]
|
Enhancing image security and privacy in cloud system using steganography
|
|
2017 |
|
|
[1]
|
Soft Computing: Theories and Applications
Lecture Notes in Networks and Systems,
2024
DOI:10.1007/978-981-97-2031-6_34
|
|
|
[2]
|
A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography
Sensors,
2022
DOI:10.3390/s22031109
|
|
|
[3]
|
Research on cloud computing-based power security management software
Journal of Computational Methods in Sciences and Engineering,
2019
DOI:10.3233/JCM-191024
|
|
|
[4]
|
Application of Steganography Technique in Cloud Computing
2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE),
2019
DOI:10.1109/ICCIKE47802.2019.9004347
|
|
|
[5]
|
Cloud Computing Technologies for Green Enterprises
Advances in Business Information Systems and Analytics,
2018
DOI:10.4018/978-1-5225-3038-1.ch012
|
|
|
[6]
|
Cyber Security and Threats
2018
DOI:10.4018/978-1-5225-5634-3.ch027
|
|
|
[7]
|
Secret digital images over cloud computing using meaningful secret sharing technique
2017 International Conference on Applied System Innovation (ICASI),
2017
DOI:10.1109/ICASI.2017.7988579
|
|
|
[8]
|
Enhancing image security and privacy in cloud system using steganography
2017 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW),
2017
DOI:10.1109/ICCE-China.2017.7991125
|
|
|