Login / Signup
Image steganography using exploiting modification direction for compressed encrypted data.
Zeyad Safaa Younus
Mohammed Khaire Hussain
Published in:
J. King Saud Univ. Comput. Inf. Sci. (2022)
Keyphrases
</>
dynamic allocation
encryption scheme
third party
data structure
encrypted data
database
information systems
database systems
sensitive data