Data hiding based on improved exploiting modification direction method and Huffman coding
The rapid growth of covert activities via communications network brought about an increasing need to provide an efficient method for data hiding to protect secret information from malicious attacks. One of the options is to combine two approaches, namely steganography and compression. However, its p...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Walter de Gruyter GmbH and Co. KG
2014
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/52286/1/AliM.Ahmad2014_Datahidingbasedonimproved.pdf http://eprints.utm.my/id/eprint/52286/ http://dx.doi.org/10.1515/jisys-2014-0007 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|