2013 7th International Conference on Intelligent Systems and Control (ISCO) 2013
DOI: 10.1109/isco.2013.6481180
|View full text |Cite
|
Sign up to set email alerts
|

Security issues in computer networks and stegnography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…Normally capacity of the Steganography (Saravanan and Neeraja, 2013) will be enhanced by sterilizing additional LSBs of a constituent. For instance rather than ever-changing just 1 LSB of a constituent, if we tend to alter 2 LSBs then the capacity can become double.…”
Section: ( )mentioning
confidence: 99%
See 4 more Smart Citations
“…Normally capacity of the Steganography (Saravanan and Neeraja, 2013) will be enhanced by sterilizing additional LSBs of a constituent. For instance rather than ever-changing just 1 LSB of a constituent, if we tend to alter 2 LSBs then the capacity can become double.…”
Section: ( )mentioning
confidence: 99%
“…As discussed by (Saravanan and Neeraja, 2013), nowadays everybody use computer networks and Internet to share resources and to exchange data between the connected nodes. This network will be classified into many sorts by supporting the properties like protocol, topology and design.…”
Section: Security Issues In Computer Networkmentioning
confidence: 99%
See 3 more Smart Citations