2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS) 2016
DOI: 10.1109/icaccs.2016.7586359
|View full text |Cite
|
Sign up to set email alerts
|

Towards Web page steganography with Attribute Truth Table

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…References [26][27][28][29] applied some techniques for improving hiding capacity. Reference [26] used CCL, Reference [27] used Huffman coding, Reference [28] used various types of quotation marks, and Reference [29] proposed a combined approach of References [26] and [28].…”
mentioning
confidence: 99%
“…References [26][27][28][29] applied some techniques for improving hiding capacity. Reference [26] used CCL, Reference [27] used Huffman coding, Reference [28] used various types of quotation marks, and Reference [29] proposed a combined approach of References [26] and [28].…”
mentioning
confidence: 99%