[PDF][PDF] A new approach for data hiding based on pixel pairs and chaotic map
S Dogan - IJ Computer Network and Information Security, 2018 - mecs-press.org
In this paper, a new data hiding algorithm based on pixel pairs using chaotic map is
proposed. Data hiding scheme is created by applying modulo function to pixel pairs. In here …
proposed. Data hiding scheme is created by applying modulo function to pixel pairs. In here …
[PDF][PDF] Computer security and software watermarking based on return-oriented programming
A Alrehily, V Thayananthan - Int J Comput Netw Inf Secur, 2018 - academia.edu
Applications of computer security issues are limited to the operating systems and gadgets
used within the computers and all other devices integrated with supercomputers. With the …
used within the computers and all other devices integrated with supercomputers. With the …
Notice of retraction: Face recognition by svm using local binary patterns
EU Haq, X Huarong, MI Khattak - 2017 14th Web Information …, 2017 - ieeexplore.ieee.org
Notice of Retraction: Face Recognition by SVM Using Local Binary Patterns Page 1 Document
Retracted from IEEE Xplore® It was recommended and agreed upon by the authors and the …
Retracted from IEEE Xplore® It was recommended and agreed upon by the authors and the …
[PDF][PDF] Transmitting security enforcement by text encrypting and image hiding technique using combined encrypt/hide keys
MJ Khami - IJEM, 2018 - mecs-press.org
Comparative study of cryptography and steganography techniques shows that they have
some strong and weak points when they used alone. But as we know from soft computing …
some strong and weak points when they used alone. But as we know from soft computing …