Amanote Research

Amanote Research

    RegisterSign In

Information Hiding Algorithm With Strong Security Based on Run Length

Information Technology Journal
doi 10.3923/itj.2014.895.903
Full Text
Open PDF
Abstract

Available in full text

Date

May 1, 2014

Authors
Jianquan XieXiaoping FanHui PengQing XieGuang Sun
Publisher

Science Alert


Related search

DOSM: A Data-Oriented Security Model Based on Information Hiding in WSNs

Information Technology Journal
2009English

Stego System on Chip With LFSR Based Information Hiding Approach

International Journal of Computer Applications
2011English

An Excellent Image Data Hiding Algorithm Based on BTC

Information Technology Journal
2011English

Analysing the Efficiency of the Packet Hiding Methods Based on the Strong Hiding Commitment Scheme (SHCS)

International Journal of Computer Applications
2013English

An Adaptive Block Truncation Coding Algorithm Based on Data Hiding

Information Technology Journal
2012English

An Improved Information Hiding Method Based on Sparse Representation

Mathematical Problems in Engineering
MathematicsEngineering
2015English

On Hiding a Plaintext Length by Preencryption

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2011English

Coverless Multi-Keywords Information Hiding Method Based on Text

International Journal of Security and its Applications
Computer Science
2016English

Optimum Reversible Information Hiding Based on Adaptive Joint Processing

2016English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy