Login / Signup
On the use of the Stirling Transform in image steganography.
Sudipta Kumar Ghosal
Jyotsna Kumar Mandal
Published in:
J. Inf. Secur. Appl. (2019)
Keyphrases
</>
neural network
computer vision
image processing
case study
three dimensional
artificial neural networks
image analysis
evolutionary algorithm
hidden markov models
fukunaga koontz