Login / Signup
Chaotic iterations for steganography: Stego-security and topological-security
Nicolas Friot
Christophe Guyeux
Jacques M. Bahi
Published in:
CoRR (2011)
Keyphrases
</>
information security
network security
statistical databases
intrusion detection
access control
security policies
security issues
data hiding
security requirements
cellular automata
security analysis