2012
DOI: 10.1007/s11042-012-1223-9
|View full text |Cite
|
Sign up to set email alerts
|

A Huffman compression based text steganography method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
33
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 42 publications
(33 citation statements)
references
References 23 publications
0
33
0
Order By: Relevance
“…In the study of [2] the authors didn't make use of complexity of obtaining decompressed text. In order to make comparison with this study only the complexities contribution of k1, k2 and Vigenere cipher were used.…”
Section: Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…In the study of [2] the authors didn't make use of complexity of obtaining decompressed text. In order to make comparison with this study only the complexities contribution of k1, k2 and Vigenere cipher were used.…”
Section: Resultsmentioning
confidence: 99%
“…In order to make comparison with this study only the complexities contribution of k1, k2 and Vigenere cipher were used. In [2] complexity was followed as 8 × ∏ 2…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations