2012
DOI: 10.3923/rjit.2012.61.72
|View full text |Cite
|
Sign up to set email alerts
|

Firmware for Data Security: A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 59 publications
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…A modified PI method along with MSB over hides LSB code is available in [12]. Several review articles are available in [22][23][24][25] which gives a clear picture about information hiding through OFDM, CDMA, Data Security in Firmware and FP GA. Its counter action is steganalysis which broadly cover the secret data presence, identifying the length of the secret or simply suppressing the secret [26][27][28][29][30].…”
Section: Entities Steganography Has Become a Feasible And Efficientmentioning
confidence: 99%
“…A modified PI method along with MSB over hides LSB code is available in [12]. Several review articles are available in [22][23][24][25] which gives a clear picture about information hiding through OFDM, CDMA, Data Security in Firmware and FP GA. Its counter action is steganalysis which broadly cover the secret data presence, identifying the length of the secret or simply suppressing the secret [26][27][28][29][30].…”
Section: Entities Steganography Has Become a Feasible And Efficientmentioning
confidence: 99%