Login / Signup
Steganographic access control in data hiding using run-length encoding and modulo-operations.
Chin-Feng Lee
Chi-Yao Weng
Aneesh Sharma
Published in:
Secur. Commun. Networks (2016)
Keyphrases
</>
data hiding
access control
run length
error correction
information hiding
spatial domain
secret data
cover image
reversible data hiding
watermarking technique
lossy compression
data embedding
database systems
multiresolution
high frequency