Author: Sajedi Hedieh
Publisher: Springer Publishing Company
ISSN: 1615-5262
Source: International Journal of Information Security (IJIS), Vol.8, Iss.6, 2009-12, pp. : 433-445
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
An evaluation of image based steganography methods
Multimedia Tools and Applications, Vol. 30, Iss. 1, 2006-07 ,pp. :