Graphstega: Graph Steganography Methodology

@article{Desoky2008GraphstegaGS,
  title={Graphstega: Graph Steganography Methodology},
  author={Abdelrahman Desoky and Mohamed F. Younis},
  journal={J. Digital Forensic Practice},
  year={2008},
  volume={2},
  pages={27-36}
}
Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy… CONTINUE READING
Highly Cited
This paper has 23 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

References

Publications referenced by this paper.
Showing 1-10 of 22 references

An Overview of Steganography for the Computer Forensics Examiner.

  • G. C. Kessler
  • Forensic Science Communications 6,
  • 2004

Investigator’s Guide to Steganography, pp. 15–16

  • G. Kipper
  • CRC Press LLC,
  • 2004
2 Excerpts

Similar Papers

Loading similar papers…