Login / Signup
Chaotic Iterations for Steganography - Stego-security and Chaos-security.
Nicolas Friot
Christophe Guyeux
Jacques M. Bahi
Published in:
SECRYPT (2011)
Keyphrases
</>
information security
intrusion detection
security policies
statistical databases
security issues
access control
network security
security requirements
security analysis
neural network
security protocols
jpeg images
information hiding
chaos theory