Login / Signup
Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best.
Elke Franz
Anja Jerichow
Steffen Möller
Andreas Pfitzmann
Ingo Stierand
Published in:
Information Hiding (1996)
Keyphrases
</>
information security
cellular automata
information hiding
multimedia
spread spectrum
data embedding
data sets
information systems
data hiding
jpeg images
hidden information
high capacity
real time
secret information
computer based learning
cognitive learning