Amanote Research

Amanote Research

    RegisterSign In

Practical Data-Hiding: Additive Attacks Performance Analysis

Lecture Notes in Computer Science - Germany
doi 10.1007/11551492_19
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 2005

Authors
J. E. Vila-ForcénS. VoloshynovskiyO. KovalF. Pérez-GonzálezT. Pun
Publisher

Springer Berlin Heidelberg


Related search

Packet-Hiding Methods for Preventing Selective Jamming Attacks

International Journal of Research in Engineering and Technology
2014English

Quantum Data Hiding

IEEE Transactions on Information Theory
Computer Science ApplicationsInformation SystemsLibraryInformation Sciences
2002English

High Performance Reversible Data Hiding for Mobile Applications and Human Interaction

International Journal of Technology and Human Interaction
Information SystemsHuman-Computer Interaction
2013English

Hiding Secrete Data in Compressed Images Using Histogram Analysis

2010English

Practical Affiliation-Hiding Authentication From Improved Polynomial Interpolation

2011English

Detecting Attacks in CyberManufacturing Systems: Additive Manufacturing Example

MATEC Web of Conferences
Materials ScienceEngineeringChemistry
2017English

Practical Attacks on the Round-Reduced PRINCE

IET Information Security
Computer NetworksSoftwareInformation SystemsCommunications
2017English

Data Hiding on Selected Object Track Using Partial Least Square Analysis

International Journal of Computer Applications
2015English

A Data Hiding Approach for Sensitive Smartphone Data

2016English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy