Author:
Saini Ravi,Joshi Kamaldeep,Nandal Rainu
Publisher
Springer Nature Singapore
Reference21 articles.
1. Ahn S, Hopper LVNJ (2004) Public-key steganography. In: Advances in cryptology (Eurocrypt 2004), vol 3027. LNCS, Springer Berlin Heidelberg, pp 323–341
2. Amirtharajan R, Akila R, Chowdavarapu PD (2010) A comparative analysis of image steganography. Int J Comp Appl 2(3):41–47
3. Amirtharajan R, Ganesan V, Jithamanyu R, Rayappan JBB (2010) An invisible communication for secret sharing against transmission error. Univ J Comp Sci Eng Technol 1(2):117–121
4. Anderson RJ (1996) Stretching the limit of steganography. In: Information hiding. Springer Lecture Notes in Computer Science, vol 1174, pp 39-48
5. Anderson RJ, Petitcolas FAP (1998) On the limits of stegnography. IEEE J Select Areas Commun 16(4):474–481