Recent advances in multimedia information security: cryptography and steganography

被引:0
|
作者
Abulkasim, Hussein [1 ]
Sun, Gengxin [2 ]
机构
[1] Ryerson Univ, Toronto, ON, Canada
[2] Qingdao Univ, Qingdao, Peoples R China
关键词
D O I
10.1007/s11042-023-15834-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:21865 / 21865
页数:1
相关论文
共 50 条
  • [21] Steganography based information security
    Ratan, R
    Madhavan, CEV
    IETE TECHNICAL REVIEW, 2002, 19 (04): : 213 - 219
  • [22] Multimedia security based on quantum cryptography and blockchain
    Multimedia Tools and Applications, 2022, 81 : 36585 - 36585
  • [23] Multimedia security based on quantum cryptography and blockchain
    Pal, Om
    Das, Prem Laxman
    Alam, Bashir
    Murthy, B. K.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (25) : 36585 - 36585
  • [24] A stegano - visual cryptography technique for multimedia security
    K. Gurunathan
    S. P. Rajagopalan
    Multimedia Tools and Applications, 2020, 79 : 3893 - 3911
  • [25] Image Steganography: A Review of the Recent Advances
    Subramanian, Nandhini
    Elharrouss, Omar
    Al-Maadeed, Somaya
    Bouridane, Ahmed
    IEEE ACCESS, 2021, 9 : 23409 - 23423
  • [26] Video steganography: recent advances and challenges
    Kunhoth, Jayakanth
    Subramanian, Nandhini
    Al-Maadeed, Somaya
    Bouridane, Ahmed
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (27) : 41943 - 41985
  • [27] Video steganography: recent advances and challenges
    Jayakanth Kunhoth
    Nandhini Subramanian
    Somaya Al-Maadeed
    Ahmed Bouridane
    Multimedia Tools and Applications, 2023, 82 : 41943 - 41985
  • [28] A survey of recent advances in image steganography
    Kumar, Akshay
    Rani, Rajneesh
    Singh, Samayveer
    SECURITY AND PRIVACY, 2023, 6 (03)
  • [29] CRYPTOGRAPHY ARCHITECTURE FOR INFORMATION SECURITY
    LENNON, RE
    IBM SYSTEMS JOURNAL, 1978, 17 (02) : 138 - 150
  • [30] Cryptography with information theoretic security
    Imai, H
    Hanaoka, G
    Shikata, J
    Otsuka, A
    Nascimento, AC
    PROCEEDINGS OF 2002 IEEE INFORMATION THEORY WORKSHOP, 2002, : 73 - 73