On The Limits Of Perfect Security For Steganographic System.
Khan Farhan RafatMuhammad SherPublished in: CoRR (2013)
Keyphrases
- digital images
- security issues
- access control
- network security
- intrusion detection
- information assurance
- information security
- statistical databases
- spatial domain
- security policies
- data mining
- computer security
- data hiding
- security requirements
- jpeg images
- information hiding
- security systems
- spread spectrum
- security management
- post processing