Login / Signup

Hiding the hidden message: approaches to textual steganography.

George R. S. WeirMichael Morran
Published in: Int. J. Electron. Secur. Digit. Forensics (2010)
Keyphrases
  • multimedia
  • strengths and weaknesses
  • real time
  • neural network
  • data mining
  • email
  • textual data
  • hidden information