Combination of Hiding and Encryption for Data Security
暂无分享,去创建一个
[1] Gaurav Bhatnagar,et al. Discrete fractional wavelet transform and its application to multiple encryption , 2013, Inf. Sci..
[2] Brian King,et al. Efficient secure image transmission: compression integrated with encryption , 2005, IS&T/SPIE Electronic Imaging.
[3] Deepak Singla,et al. Data Security Using LSB & DCT Steganography In Images , 2012 .
[4] Qi Han,et al. Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things , 2018, Future Gener. Comput. Syst..
[5] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[6] Haider Alrikabi,et al. The Application of Wireless Communication in IOT for Saving Electrical Energy , 2020, Int. J. Interact. Mob. Technol..
[7] S. Lavanya,et al. Secure and Authenticated Reversible Data Hiding in Encrypted Image , 2013 .
[8] Deepu Job,et al. A Secure Dual Encryption Scheme Combined With Steganography , 2014 .
[9] Abikoye OluwakemiC.,et al. Efficient Data Hiding System using Cryptography and Steganography , 2012 .
[10] Brojo Kishore Mishra,et al. Pros and Cons of Cryptography , Steganography and Perturbation techniques , 2015 .
[11] Md. Rajibul Islam,et al. Biometric template protection using watermarking with hidden password encryption , 2008, 2008 International Symposium on Information Technology.
[12] Abduladhem A. Ali,et al. Classification of Electroencephalograph ( EEG ) Signals Using Quantum Neural Network , 2011 .
[13] Aslak Grinsted,et al. Nonlinear Processes in Geophysics Application of the Cross Wavelet Transform and Wavelet Coherence to Geophysical Time Series , 2022 .
[14] Pye Pye Aung,et al. A Novel Secure Combination Technique of Steganography and Cryptography , 2014 .
[15] Lokenath Debnath,et al. The Wavelet Transforms , 2017 .
[16] K. Jyothi,et al. An improved method for reversible data hiding steganography combined with cryptography , 2018, 2018 2nd International Conference on Inventive Systems and Control (ICISC).
[17] Zhengjun Liu,et al. Random fractional Fourier transform. , 2007, Optics letters.
[18] C. L. Philip Chen,et al. Data-intensive applications, challenges, techniques and technologies: A survey on Big Data , 2014, Inf. Sci..
[19] Wei Liu,et al. Optical color image hiding scheme based on chaotic mapping and Hartley transform , 2013 .
[20] Amal Khalifa,et al. DNA-Based Data Encryption and Hiding Using Playfair and Insertion Techniques , 2011 .
[21] Fatma A. Omara,et al. Data Security Using Cryptography and Steganography Techniques , 2016 .
[22] Jessica Koehler,et al. Advanced Digital Signal Processing And Noise Reduction , 2016 .
[23] Joseph T. Lizier,et al. Probability Mass Exclusions and the Directed Components of Mutual Information , 2018, Entropy.
[24] Haider Alrikabi,et al. Reducing the Data Rate in Internet of Things Applications by Using Wireless Sensor Network , 2020, Int. J. Online Biomed. Eng..
[25] J. Goree,et al. Strongly coupled plasmas obey the fluctuation theorem for entropy production , 2017, Nature Physics.
[26] Faisal Theyab Abed,et al. Analysis the Efficient Energy Prediction for 5G Wireless Communication Technologies , 2019, Int. J. Emerg. Technol. Learn..