Login / Signup
A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information.
Sahar A. El-Rahman
Published in:
Comput. Electr. Eng. (2018)
Keyphrases
</>
data sets
probabilistic model
rough sets
access control
database design