![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Kim Cheonshik
Publisher: Springer Publishing Company
ISSN: 1380-7501
Source: Multimedia Tools and Applications, Vol.69, Iss.3, 2014-04, pp. : 569-584
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Security of data hiding technologies
By Voloshynovskiy S. Pun T. Fridrich J. Perez-Gonzalez F. Memon N.
Signal Processing, Vol. 83, Iss. 10, 2003-10 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Research advances in data hiding for multimedia security
Multimedia Tools and Applications, Vol. 52, Iss. 2-3, 2011-04 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)