Login / Signup
High security image steganography using IWT and graph theory.
V. Thanikaiselvan
Pachiyappan Arulmozhivarman
Published in:
ICSIPA (2013)
Keyphrases
</>
graph theory
high security
image encryption
security analysis
social network analysis
graph theoretical
complex networks
graph theoretic
graph based representations
similarity measure
information systems
combinatorial optimization
encryption algorithm