Applied Cryptography and Network Security
From MaRDI portal
Publication:4680935
Recommendations
Cited in
(7)- Security levels in steganography -- insecurity does not imply detectability
- Steganalysis of StegoStorage system
- On noise synchronization analysis in steganography using stochastic modulation
- Security of steganographic systems
- On steganographic system selection rule
- An Epistemological Approach to Steganography
- scientific article; zbMATH DE number 1894623 (Why is no real title available?)
This page was built for publication: Applied Cryptography and Network Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4680935)