2009 International Conference on Industrial and Information Systems (ICIIS) 2009
DOI: 10.1109/iciinfs.2009.5429897
|View full text |Cite
|
Sign up to set email alerts
|

Secured communication using Steganography Framework with sample RTF implementation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2012
2012

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…(2) Classification of Information Hiding Technique The information hiding technology can be classified as follows [1]:…”
Section: Information Hidingmentioning
confidence: 99%
See 2 more Smart Citations
“…(2) Classification of Information Hiding Technique The information hiding technology can be classified as follows [1]:…”
Section: Information Hidingmentioning
confidence: 99%
“…In its development process, it gradually formed into two branches, namely technology steganography and semantic steganography [1]. In its development process, it gradually formed into two branches, namely technology steganography and semantic steganography [1].…”
Section: Steganography Techniquementioning
confidence: 99%
See 1 more Smart Citation