2020
DOI: 10.1016/j.jisa.2019.102434
|View full text |Cite
|
Sign up to set email alerts
|

Steganography over Redundant Residue Number System Codes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 38 publications
0
1
0
Order By: Relevance
“…The protocol is much advanced relative to the other classes and strives to use the platform or protocol to hide data. Belhamra and Souidi [12] defined steganography over Redundant Residue Number System (RRNS) Codes and explained distortion-less RRNS based steganographic techniques with an investigation of their corresponding hiding capacities and then discussed their results. Sikarwar [5] proposed another approach based on an integrated and synchronized protocol, connecting the applications of the secure algorithm, powerful key cryptography, and multilevel steganography since it is more effective compared to simple steganography.…”
Section: Related Workmentioning
confidence: 99%
“…The protocol is much advanced relative to the other classes and strives to use the platform or protocol to hide data. Belhamra and Souidi [12] defined steganography over Redundant Residue Number System (RRNS) Codes and explained distortion-less RRNS based steganographic techniques with an investigation of their corresponding hiding capacities and then discussed their results. Sikarwar [5] proposed another approach based on an integrated and synchronized protocol, connecting the applications of the secure algorithm, powerful key cryptography, and multilevel steganography since it is more effective compared to simple steganography.…”
Section: Related Workmentioning
confidence: 99%