

Publisher: IGI Global_journal
E-ISSN: 1930-1669|12|3|141-163
ISSN: 1930-1650
Source: International Journal of Information Security and Privacy (IJISP), Vol.12, Iss.3, 2018-07, pp. : 141-163
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content








Selective Redundancy Removal: A Framework for Data Hiding
By Fiore Ugo
Future Internet, Vol. 2, Iss. 1, 2010-02 ,pp. :