|
Volumn , Issue , 2009, Pages 405-409
|
"stego-analysis chain, session one" investigations on steganography weakness VS stego-analysis system for multimedia file
|
Author keywords
Conselmet Methodes; Hidden Data; Steganography; Steganography Attackers; Stego Analysis
|
Indexed keywords
CONSELMET METHODES;
HIDDEN DATA;
STEGANOGRAPHY;
STEGANOGRAPHY ATTACKERS;
STEGO-ANALYSIS;
COMPUTER SCIENCE;
INFORMATION TECHNOLOGY;
MULTIMEDIA SYSTEMS;
CRYPTOGRAPHY;
|
EID: 70449587027
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/IACSIT-SC.2009.105 Document Type: Conference Paper |
Times cited : (16)
|
References (12)
|