![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Sajedi Hedieh
Publisher: Springer Publishing Company
ISSN: 1615-5262
Source: International Journal of Information Security (IJIS), Vol.8, Iss.6, 2009-12, pp. : 433-445
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
An evaluation of image based steganography methods
Multimedia Tools and Applications, Vol. 30, Iss. 1, 2006-07 ,pp. :