2017 International Conference on Innovative Mechanisms for Industry Applications (ICIMIA) 2017
DOI: 10.1109/icimia.2017.7975529
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of techniques involving data hiding and watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…Cryptography is the process of message transfer in achieving confidentiality. Cryptography is known as secret writing to keep from the various attackers from stealing the secret information [6]. By using cryptography, the secret message will be converted into a cipher text in the form of plain text [6] .…”
Section: Introductionmentioning
confidence: 99%
“…Cryptography is the process of message transfer in achieving confidentiality. Cryptography is known as secret writing to keep from the various attackers from stealing the secret information [6]. By using cryptography, the secret message will be converted into a cipher text in the form of plain text [6] .…”
Section: Introductionmentioning
confidence: 99%