Article Fingerprint
ReserarchID
CSTGV97UYQ
As the use digital techniques for transmitting and storing images are increasing; it is becoming an important issue how to protect the confidentiality, integrity and authenticity of images. This study paper extends to the performance parameters used in encryption processes and analyzing on their security issues which have been developed and are in practice today.
Dr. S.M. Riyazoddin. 1970. \u201cAnalysis of Data Hiding Techniques in Encrypted Images -A Survey\u201d. Global Journal of Computer Science and Technology - F: Graphics & Vision GJCST-F Volume 13 (GJCST Volume 13 Issue F4).
Crossref Journal DOI 10.17406/gjcst
Print ISSN 0975-4350
e-ISSN 0975-4172
Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.
Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.
Total Score: 102
Country: India
Subject: Global Journal of Computer Science and Technology - F: Graphics & Vision
Authors: K. Arun Kumar, S.M. Riyazoddin (PhD/Dr. count: 0)
View Count (all-time): 251
Total Views (Real + Logic): 25412
Total Downloads (simulated): 10837
Publish Date: 1970 01, Thu
Monthly Totals (Real + Logic):
This study aims to comprehensively analyse the complex interplay between
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.