Data hiding based on improved exploiting modification direction method and Huffman coding

The rapid growth of covert activities via communications network brought about an increasing need to provide an efficient method for data hiding to protect secret information from malicious attacks. One of the options is to combine two approaches, namely steganography and compression. However, its p...

Full description

Saved in:
Bibliographic Details
Main Authors: Ahmad, Ali M., Sulong, Ghazali, Rehman, Amjad, Alkawaz, Mohammed Hazim, Saba, Tanzila
Format: Article
Language:English
Published: Walter de Gruyter GmbH and Co. KG 2014
Subjects:
Online Access:http://eprints.utm.my/id/eprint/52286/1/AliM.Ahmad2014_Datahidingbasedonimproved.pdf
http://eprints.utm.my/id/eprint/52286/
http://dx.doi.org/10.1515/jisys-2014-0007
Tags: Add Tag
No Tags, Be the first to tag this record!