References
- Hailun, T., John, Z., Sanjay K, J. and Diethelm, O. (2011), ‘Secure multihop network programming with multiple one-way key chains’, IEEE Transactions on Mobile Computing 10(1), 16–31. doi: https://doi.org/10.1109/TMC.2010.140
- Guanglou, Z., Rajan, S., Wencheng, Y., Craig, V., Li, Q., Mehmet A, O. and Subhas Chandra, M. (2019), ‘A critical analysis of ECG-based key distribution for securing wearable and implantable medical devices’, IEEE Sensors Journal 19(3), 1186–1198. doi: https://doi.org/10.1109/JSEN.2018.2879929
- Huang, C., Ma, P. Y., Shastri, B. J., Mittal, P. and Prucnal, P. R. (2019b), Robustness of optical steganographic communication under coherent detection attack’, IEEE Photonics Technology Letters 31(4), 327–330. doi: https://doi.org/10.1109/LPT.2019.2891955
- Mohamed., Nazir A, L., Shabir A, P., Muhammad, K., Javaid, A. S. and Bhat, G. (2016), ‘A reversible and secure patient information hiding system for iot driven ehealth’, International Journal of Information Management 45, 262–275.
- Jiu-fen, L., Yu-guo, Tian, T. H., Chun-fang, Y. and Wen-bin, L. (2015), ‘LSB steganographic payload location for JPEG-decompressed images’, Digital Signal Processing 38, 66–76. doi: https://doi.org/10.1016/j.dsp.2014.12.004
- Jorge, B., Julio Cesar, H.-C., Jose Maria de, F. and Benjami’n, R. (2012), ‘A framework for avoiding steganography usage over HTTP’, Journal of Network and Computer Applications 35, 491–501. doi: https://doi.org/10.1016/j.jnca.2011.10.003
- Juan, W., Xuejing, Z., Mengdi, L., Ping, Z. and Yiming, X. (2019), ‘A novel natural language steganographic framework based on image description neural network’, Journal of Visual Communication and Image Representation 61, 157–169. doi: https://doi.org/10.1016/j.jvcir.2019.03.016
- Junaid Jameel, A., Shujun, L., Richard, T. and Marco, M. (2013), ‘Secure computing with the MPEG RVC framework’, Signal Processing: Image Communication 28(10), 1315–1334.
- Kamal, A. and Mahfuzul Islam, M. (2014), ‘Facilitating and securing offline e-medicine service through image steganography’, Healthcare Technology Letters 1(2), 74–79. doi: https://doi.org/10.1049/htl.2013.0026
- Kouzehzar, H., Moghadam, M. N. and Torkzadeh, P. (2018), ‘A high data rate pipelined architecture of aes encryption/decryption in storage area networks’, Electrical Engineering (ICEE), Iranian Conference on pp. 23–28.
- Kumar, G. and Umesh, G. (2018), ‘Image steganography based on canny edge detection, dilation operator and hybrid coding’, Journal of Information Security and Applications 41, 41–51. doi: https://doi.org/10.1016/j.jisa.2018.05.001
- Li, B., Zhou, Q., Si, X. and Fu, J. (2018), ‘Mimic encryption system for network security’, IEEE Access 6, 50468–50487.
- Li, L., Ahmed A. Abd, E.-L. and Xiamu, N. (2012), ‘Elliptic curve elgamal based homomorphic image encryption scheme for sharing secret images’, Signal Processing 92(4), 1069–1078. doi: https://doi.org/10.1016/j.sigpro.2011.10.020
- Li, L., Liu, L., Peng, H., Yang, Y. and Cheng, S. (2019), ‘Flexible and secure data transmission system based on semitensor compressive sensing in wireless body area networks’, IEEE Internet of Things Journal 6(2), 3212–3227. doi: https://doi.org/10.1109/JIOT.2018.2881129
- Liang, H. and Wei, C. (2014), ‘Information theory and cryptography-based secured communication scheme for cooperative MIMO communication in wireless sensor networks’, Ad Hoc Networks 14, 95—-105. doi: https://doi.org/10.1016/j.adhoc.2013.11.008
- Liu, G., Liu, B., Liu, X., Li, F. and Guo, W. (2015), ‘Low-complexity secure network coding against wiretapping using intra/inter-generation coding’, China Communications 12(6), 116–125. doi: https://doi.org/10.1109/CC.2015.7122470
- Liu, J., Zhang, L., Sun, R., Du, X. and Guizani, M. (2018), ‘Mutual heterogeneous signcryption schemes for 5g network slicings’, IEEE Access 6, 7854–7863. doi: https://doi.org/10.1109/ACCESS.2018.2797102
- Liu, T., Tian, J., Gui, Y., Liu, Y. and Liu, P. (2017), ‘Sedea: State estimation-based dynamic encryption and authentication in smart grid’, IEEE Access 5, 15682–15693. doi: https://doi.org/10.1109/ACCESS.2017.2713440
- Mamta, J., Saroj Kumar, L. and Sunil Kumar, V. (2016), ‘Adaptive circular queue image steganography with RSA cryptosystem’, Perspectives in Science 8, 417–420. doi: https://doi.org/10.1016/j.pisc.2016.04.093
- Mao, Q. (2014), ‘A fast algorithm for matrix embedding steganography’, Digital Signal Processing 25(25), 248–254. doi: https://doi.org/10.1016/j.dsp.2013.11.001
- Sanjeev, K., Amarpal, S. and Manoj, K. (2019), ‘Information hiding with adaptive steganography based on novel fuzzy edge identification’, Defence Technology 15(2), 162–169. doi: https://doi.org/10.1016/j.dt.2018.08.003