Login / Signup

Image steganography using exploiting modification direction for compressed encrypted data.

Zeyad Safaa YounusMohammed Khaire Hussain
Published in: J. King Saud Univ. Comput. Inf. Sci. (2022)
Keyphrases
  • dynamic allocation
  • encryption scheme
  • third party
  • data structure
  • encrypted data
  • database
  • information systems
  • database systems
  • sensitive data