共 50 条
- [23] Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (22):
- [24] Using the Chaotic Map in Image Steganography 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 491 - +
- [25] Using the Chaotic Map in Image Steganography PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, : 754 - +
- [26] Enhanced the Security of Image Steganography Through Image Encryption 2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
- [29] An Edge Based Image Steganography with Compression and Encryption 2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
- [30] An Edge Based Image Steganography with Compression and Encryption 2015 International Conference on Computing, Communication and Security (ICCCS), 2015,