![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Desoky Abdelrahman
Publisher: Inderscience Publishers
ISSN: 1747-8405
Source: International Journal of Security and Networks, Vol.6, Iss.2-3, 2011-11, pp. : 153-173
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
International Journal of Digital Crime and Forensics (IJDCF), Vol. 2, Iss. 3, 2010-07 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
An evaluation of image based steganography methods
Multimedia Tools and Applications, Vol. 30, Iss. 1, 2006-07 ,pp. :