Multi-image steganography and authentication using crypto-stego techniques

H Sharma, RK Sharma, N Kumar - Multimedia Tools and Applications, 2021 - Springer
It is a necessity to protect sensitive information in digital form from an adversary who may
indulge in cyber-crimes such as modification, masquerading, and replaying of data. Security …

Multi-image steganography and authentication using crypto-stego techniques.

H Sharma, DC Mishra, RK Sharma… - Multimedia Tools & …, 2021 - search.ebscohost.com
It is a necessity to protect sensitive information in digital form from an adversary who may
indulge in cyber-crimes such as modification, masquerading, and replaying of data. Security …

Multi-image steganography and authentication using crypto-stego techniques

S Himani, DC Mishra, RK Sharma… - Multimedia Tools and …, 2021 - search.proquest.com
It is a necessity to protect sensitive information in digital form from an adversary who may
indulge in cyber-crimes such as modification, masquerading, and replaying of data. Security …

Multi-image steganography and authentication using crypto-stego techniques

H Sharma, DC Mishra, RK Sharma… - Multimedia Tools and …, 2021 - dl.acm.org
It is a necessity to protect sensitive information in digital form from an adversary who may
indulge in cyber-crimes such as modification, masquerading, and replaying of data. Security …