W Bender,
D Gruhl,
N Morimoto, A Lu - IBM systems Journal, 2000 - scholar.archive.org
… the data must be immune to interception, modification, or removal. We explore both traditional
… novel techniques for addressing the data hiding process and evaluate these techniques in …