![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Publisher: IGI Global_journal
E-ISSN: 1930-1669|8|1|19-37
ISSN: 1930-1650
Source: International Journal of Information Security and Privacy (IJISP), Vol.8, Iss.1, 2014-01, pp. : 19-37
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
An evaluation of image based steganography methods
Multimedia Tools and Applications, Vol. 30, Iss. 1, 2006-07 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
An iterative method of palette-based image steganography
By Wu M.-Y. Ho Y.-K. Lee J.-H.
Pattern Recognition Letters, Vol. 25, Iss. 3, 2004-02 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)