Learn More
Due to the nature of multimedia data exchange over the Intemet between authorized users, one of the most difficult tasks is to control unauthorized information flow. With respect to confidentiality requirements and breaches in security, steganography offers an instrument for attackers to hide a communication by embedding the secret message into an innocuous(More)
  • 1