Amanote Research

Amanote Research

    RegisterSign In

Perfect Undetectability of Network Steganography

Security and Communication Networks - Egypt
doi 10.1002/sec.1491
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer NetworksInformation SystemsCommunications
Date

April 27, 2016

Authors
Wojciech FrączekKrzysztof Szczypiorski
Publisher

Wiley


Related search

Perfect Hashing for Network Applications

2006English

Video Steganography Using Convolutional Neural Network and Temporal Residual Method

International Journal of Computer Applications
2019English

Comparison of Topological Property of Perfect Difference Network and Hypercube

International Journal of Computer Applications
2012English

Recurrent Network Models for Perfect Temporal Integration of Fluctuating Correlated Inputs

PLoS Computational Biology
Molecular NeuroscienceEvolutionEcologyGeneticsBehaviorMolecular BiologySystematicsSimulationCellularComputational TheoryMathematicsModeling
2009English

Practice Doesn't Make Perfect; Perfect Practice Makes Perfect

Scientific Bulletin of Naval Academy
2016English

Cryptographic Steganography

2014English

Text Based Steganography

International Journal of Information Privacy, Security and Integrity
2017English

Public-Key Steganography

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2004English

Spread Spectrum Image Steganography

IEEE Transactions on Image Processing
Computer GraphicsComputer-Aided DesignSoftware
1999English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy