Login / Signup

On the use of the Stirling Transform in image steganography.

Sudipta Kumar GhosalJyotsna Kumar Mandal
Published in: J. Inf. Secur. Appl. (2019)
Keyphrases
  • neural network
  • computer vision
  • image processing
  • case study
  • three dimensional
  • artificial neural networks
  • image analysis
  • evolutionary algorithm
  • hidden markov models
  • fukunaga koontz