Found: 41
Select item for more details and to access through your institution.
Performance Analysis for Secret Message Sharing using Different Levels of Encoding Over QSDC.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 3, p. 519, doi. 10.14569/ijacsa.2024.0150353
- By:
- Publication type:
- Article
Controlled Quantum Secure Direct Communication Protocol Based on Huffman Compression Coding.
- Published in:
- International Journal of Theoretical Physics, 2018, v. 57, n. 12, p. 3632, doi. 10.1007/s10773-018-3876-2
- By:
- Publication type:
- Article
A novel approach for verifiable (n, n) audio secret sharing scheme.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 19, p. 25629, doi. 10.1007/s11042-018-5810-2
- By:
- Publication type:
- Article
Comment on “Efficient quantum dialogue without information leakage”.
- Published in:
- Modern Physics Letters B, 2018, v. 32, n. 22, p. N.PAG, doi. 10.1142/S0217984918750015
- By:
- Publication type:
- Article
A novel semi-quantum secret sharing scheme using entangled states.
- Published in:
- Modern Physics Letters B, 2018, v. 32, n. 22, p. N.PAG, doi. 10.1142/S0217984918502561
- By:
- Publication type:
- Article
Double C-NOT attack and counterattack on ‘Three-step semi-quantum secure direct communication protocol’.
- Published in:
- Quantum Information Processing, 2018, v. 17, n. 7, p. 1, doi. 10.1007/s11128-018-1953-3
- By:
- Publication type:
- Article
Visual secret sharing in halftone images by multi-scale error diffusion.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 10, p. 12111, doi. 10.1007/s11042-017-4861-0
- By:
- Publication type:
- Article
High-fidelity lossless data hiding based on predictors selection.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 22, p. 23699, doi. 10.1007/s11042-016-4133-4
- By:
- Publication type:
- Article
A Review of Image Steganography Techniques: Development Trends to Enhance Performance.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 1852
- By:
- Publication type:
- Article
Improved Data Security using Steganography.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 2782
- By:
- Publication type:
- Article
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2017, v. 7, n. 2, p. 799, doi. 10.11591/ijece.v7i2.pp799-809
- By:
- Publication type:
- Article
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 7, p. 9993, doi. 10.1007/s11042-016-3591-z
- By:
- Publication type:
- Article
Digital image steganalysis based on the reciprocal singular value curve.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 6, p. 8745, doi. 10.1007/s11042-016-3507-y
- By:
- Publication type:
- Article
Adaptive ( k, F ) interpolation-based hiding scheme.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 2, p. 1827, doi. 10.1007/s11042-015-3168-2
- By:
- Publication type:
- Article
ROBUSTNESS OF THE SECRET MESSAGE IN STEGO FILE AGAINST FLIP AND ROTATION ATTACK.
- Published in:
- Annals: Series on Mathematics & its Applications, 2017, v. 9, n. 1, p. 5
- By:
- Publication type:
- Article
AUDIO CRYPTANALYSIS - AN APPLICATION OF SYMMETRIC KEY CRYPTOGRAPHY AND AUDIO STEGANOGRAPHY.
- Published in:
- ICTACT Journal on Communication Technology, 2016, v. 7, n. 3, p. 1345
- By:
- Publication type:
- Article
An adaptive multi bit-plane image steganography using block data-hiding.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 14, p. 8319, doi. 10.1007/s11042-015-2752-9
- By:
- Publication type:
- Article
Efficient quantum dialogue using entangled states and entanglement swapping without information leakage.
- Published in:
- Quantum Information Processing, 2016, v. 15, n. 6, p. 2593, doi. 10.1007/s11128-016-1294-z
- By:
- Publication type:
- Article
Reversible Steganographic Method Using Complexity Control and Human Visual System.
- Published in:
- Computer Journal, 2015, v. 58, n. 10, p. 2583, doi. 10.1093/comjnl/bxu142
- By:
- Publication type:
- Article
Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings.
- Published in:
- Computer Journal, 2015, v. 58, n. 10, p. 2636, doi. 10.1093/comjnl/bxv002
- By:
- Publication type:
- Article
Watermark with DSA signature using predictive coding.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 14, p. 5189, doi. 10.1007/s11042-013-1667-6
- By:
- Publication type:
- Article
An Approach for Text Steganography: Generating Tamil Text Summary Using Tamil Phonetics.
- Published in:
- International Review on Computers & Software, 2015, v. 10, n. 2, p. 137, doi. 10.15866/irecos.v10i2.5196
- By:
- Publication type:
- Article
An Enriched Audio Steganography for Secret Message Communication Using Novel Embedding Technique.
- Published in:
- International Review on Computers & Software, 2014, v. 9, n. 10, p. 1645
- By:
- Publication type:
- Article
A New Sender-Side Public-Key Deniable Encryption Scheme with Fast Decryption.
- Published in:
- KSII Transactions on Internet & Information Systems, 2014, v. 8, n. 9, p. 3231, doi. 10.3837/tiis.2014.09.016
- By:
- Publication type:
- Article
Linguistic steganalysis using the features derived from synonym frequency.
- Published in:
- Multimedia Tools & Applications, 2014, v. 71, n. 3, p. 1893, doi. 10.1007/s11042-012-1313-8
- By:
- Publication type:
- Article
A High Capacity Steganographic Method Based on Quantization Table Modification and F5 Algorithm.
- Published in:
- Circuits, Systems & Signal Processing, 2014, v. 33, n. 5, p. 1611, doi. 10.1007/s00034-013-9703-3
- By:
- Publication type:
- Article
Cryptanalysis and Improvement of the Controlled Quantum Secure Direct Communication by Using Four Particle Cluster States.
- Published in:
- International Journal of Theoretical Physics, 2014, v. 53, n. 5, p. 1495, doi. 10.1007/s10773-013-1949-9
- By:
- Publication type:
- Article
Dual Stegnography Scheme for Secure Data Communication using Finite State Machine.
- Published in:
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 4, p. 1
- By:
- Publication type:
- Article
Quantum Secure Communication Network Protocol with Entangled Photons for Mobile Communications.
- Published in:
- Mobile Networks & Applications, 2014, v. 19, n. 1, p. 121, doi. 10.1007/s11036-013-0454-y
- By:
- Publication type:
- Article
Image Hiding Using Variable Length Least Significant Bits Embedding.
- Published in:
- Iraqi Journal for Electrical & Electronic Engineering, 2014, v. 10, n. 1, p. 15, doi. 10.33762/eeej.2014.93014
- By:
- Publication type:
- Article
One-insider attack of quantum secret sharing protocol with collective eavesdropping-check.
- Published in:
- Quantum Information Processing, 2014, v. 13, n. 1, p. 33, doi. 10.1007/s11128-013-0653-2
- By:
- Publication type:
- Article
Genetic Algorithm Based Model in Text Steganography.
- Published in:
- African Journal of Information Systems, 2013, v. 5, n. 4, p. 131
- By:
- Publication type:
- Article
Man-in-the-Middle Attack on 'Quantum Dialogue with Authentication Based on Bell States'.
- Published in:
- International Journal of Theoretical Physics, 2013, v. 52, n. 9, p. 3199, doi. 10.1007/s10773-013-1614-3
- By:
- Publication type:
- Article
Attack on the Improved Quantum Blind Signature Protocol.
- Published in:
- 2013
- By:
- Publication type:
- Letter
Quantum Authenticated Direct Communication Using Bell States.
- Published in:
- 2013
- By:
- Publication type:
- Letter
Secure multiparty quantum secret sharing with the collective eavesdropping-check character.
- Published in:
- Quantum Information Processing, 2013, v. 12, n. 1, p. 55, doi. 10.1007/s11128-011-0351-x
- By:
- Publication type:
- Article
Steganography for Invisible Communication: A Review.
- Published in:
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 6, p. 149
- By:
- Publication type:
- Article
Text split-based steganography in OOXML format documents for covert communication.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 9, p. 957, doi. 10.1002/sec.378
- By:
- Publication type:
- Article
On F5 Steganography in Images.
- Published in:
- Computer Journal, 2012, v. 55, n. 4, p. 447, doi. 10.1093/comjnl/bxr092
- By:
- Publication type:
- Article
Steganalysis of adaptive image steganography in multiple gray code bit-planes.
- Published in:
- Multimedia Tools & Applications, 2012, v. 57, n. 3, p. 651, doi. 10.1007/s11042-010-0663-3
- By:
- Publication type:
- Article
Word-Based LSB Image Steganography.
- Published in:
- International Journal of Advanced Research in Computer Science, 2011, v. 2, n. 6, p. 15
- By:
- Publication type:
- Article