Graph Theoretic Approach to Steganography to Secure Message Digest.
Vinay KumarSunil Kumar MuttooPublished in: Inf. Secur. J. A Glob. Perspect. (2010)
Keyphrases
- secret message
- least significant bit
- authentication scheme
- information hiding
- data hiding
- spatial domain
- spread spectrum
- covert channel
- communication channels
- security issues
- hidden information
- jpeg images
- security requirements
- user authentication
- multi party
- transform domain
- information security
- smart card
- digital images