Citations in impact factor journals
Minimizing conservativity violations in ontology alignments:
algorithms and evaluation Knowledge and Information Systems Vol. 51, Issue 3, 775, 2017 |
Open hiding for truncating hackers - a block truncation and
wavelet approach Multimedia Tools and Applications |
Indicator-based lightweight steganography on 32-bit RISC
architectures for IoT security Multimedia Tools and Applications |
An overview of visual cryptography techniques Multimedia Tools and Applications |
Citation to this article as recorded by
Advances in Artificial Intelligence and Data Engineering Advances in Intelligent Systems and Computing |
A New Image-Based Hybrid Reversible Data Hiding Model Using IHWT
and RP-PEHM for Secured Data Communication Circuits, Systems, and Signal Processing |
Robust image steganography approach based on RIWT-Laplacian pyramid and histogram shifting using deep learning Multimedia Systems |
Multimedia digital art design based on double-buffer cooperation and distributed index Personal and Ubiquitous Computing |
A watermarking scheme using intellectual encoding-encryption based blind reversible integer wavelet-singular value decomposition transform for authenticity detection Journal of Ambient Intelligence and Humanized Computing Vol. 12, Issue 7, 7715, 2021 |
Comparative analysis of integer wavelet transforms in reversible data hiding using threshold based histogram modification Journal of King Saud University - Computer and Information Sciences Vol. 33, Issue 7, 878, 2021 |
Irregular ROI–Based Tamper Detection and Recovery of Medical Images using Data Hiding 2017 27th International Conference on Computer Theory and Applications (ICCTA) |
Data Security in Cloud Computing Using Steganography: A Review 2019 International Conference on Innovative Trends in Computer Engineering (ITCE) |
Integration of Biometrics and Steganography: A Comprehensive Review Technologies Vol. 7, Issue 2, 34, 2019 |
How to cite this article
Ahmad Shaik, V. Thanikaiselvan and Rengarajan Amitharajan, 2017. Data Security Through Data Hiding in Images: A Review. Journal of Artificial Intelligence, 10: 1-21.
DOI: 10.3923/jai.2017.1.21
URL: https://scialert.net/abstract/?doi=jai.2017.1.21
DOI: 10.3923/jai.2017.1.21
URL: https://scialert.net/abstract/?doi=jai.2017.1.21