Login / Signup

A data hiding scheme using pixel value differencing and improving exploiting modification directions.

Shu-Yuan ShenLi-Hong Huang
Published in: Comput. Secur. (2015)
Keyphrases