Cited By
View all- Tziakouris GBahsoon RBabar M(2018)A Survey on Self-Adaptive Security for Large-scale Open EnvironmentsACM Computing Surveys10.1145/323414851:5(1-42)Online publication date: 9-Oct-2018
- Singhal ABedi PMitra STrajković LBedi PMcIntosh SRajasree M(2015)Steganography using Cuckoo Optimized Wavelet CoefficientsProceedings of the Third International Symposium on Women in Computing and Informatics10.1145/2791405.2791500(365-370)Online publication date: 10-Aug-2015
- Nehete SSawarkar SSohani MMishra B(2011)Digital audio steganography using DWT with reduced embedding error and better extraction compared to DCTProceedings of the International Conference & Workshop on Emerging Trends in Technology10.1145/1980022.1980059(167-168)Online publication date: 25-Feb-2011
- Show More Cited By