Author:
Chaudhary Shikha,Hiranwal Saroj,Gupta C. P.
Publisher
Springer Nature Singapore
Reference35 articles.
1. De Leeuw K, Bergstra J (2007) The history of information security. Elsevier, Burlington
2. Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287
3. Kuhn M (1996) Information hiding. In Proceedings of the First International Workshop on Information Hiding
4. Johnson N, Duric Z, Jajodia S (2003) Information hiding. Kluwer Academic, Boston
5. Simmons G (1983) The prisoners’ problem and the subliminal channel. In Proceedings of CRYPTO: advances in Cryptology, pp 51–67