Login / Signup
Modified Multi-Level Steganography to Enhance Data Security.
Shadi Elshare
Nameer N. El-Emam
Published in:
Int. J. Commun. Networks Inf. Secur. (2018)
Keyphrases
</>
data security
access control
information security
data management
data centric
data privacy
data integrity
database
databases
third party
cloud computing