Author of the publication

A novel coverless information hiding method based on the average pixel value of the sub-images.

, , , , and . Multim. Tools Appl., 78 (7): 7965-7980 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XSS-immune: a Google chrome extension-based XSS defensive framework for contemporary platforms of web applications., and . Secur. Commun. Networks, 9 (17): 3966-3986 (2016)Plague of cross-site scripting on web applications: a review, taxonomy and challenges., and . Int. J. Web Based Communities, 14 (1): 64-93 (2018)Metadata Security Measures for Protecting Confidential Information on the Cloud., , , and . CSoNet, volume 12575 of Lecture Notes in Computer Science, page 398-410. Springer, (2020)Advances in Security and Privacy of Multimedia Big Data in Mobile and Cloud Computing., , and . Multim. Tools Appl., 77 (7): 9203-9208 (2018)A Practical Public Key Encryption Scheme Based on Learning Parity With Noise., , , , and . IEEE Access, (2018)An Efficient and Secure Identity-Based Signature System for Underwater Green Transport System., , , , , and . IEEE Trans. Intell. Transp. Syst., 23 (9): 16161-16169 (2022)Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art., and . Int. J. Syst. Assur. Eng. Manag., 8 (1s): 512-530 (2017)Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud., , and . Int. J. Cloud Appl. Comput., 7 (1): 1-31 (2017)PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications., and . Conf. Computing Frontiers, page 59:1-59:8. ACM, (2015)XSSPro: XSS Attack Detection Proxy to Defend Social Networking Platforms., , , and . CSoNet, volume 12575 of Lecture Notes in Computer Science, page 411-422. Springer, (2020)