Login / Signup

A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information.

Sahar A. El-Rahman
Published in: Comput. Electr. Eng. (2018)
Keyphrases
  • data sets
  • probabilistic model
  • rough sets
  • access control
  • database design