ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
0
views
0
references
Top references
cited by
6
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,038
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
Text Steganography System Using Markov Chain Source Model and DES Algorithm
Author(s):
Weihui Dai
,
Yue Yu
,
Yonghui Dai
,
Bin Deng
Publication date:
2010
Journal:
Journal of Software
Read this article at
ScienceOpen
Publisher
Bookmark
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Electronic Workshops in Computing (eWiC)
Author and article information
Journal
DOI::
10.4304/jsw.5.7.785-792
ScienceOpen disciplines:
Computer science
,
Security & Cryptology
,
Artificial intelligence
,
Graphics & Multimedia design
Data availability:
ScienceOpen disciplines:
Computer science
,
Security & Cryptology
,
Artificial intelligence
,
Graphics & Multimedia design
Comments
Comment on this article
Sign in to comment
scite_
Similar content
2,038
Using contourlet transform and cover selection for secure steganography
Authors:
Hedieh Sajedi
,
Mansour Jamzad
,
H. Sajedi
…
Implementation of a steganography system based on hybrid square quaternion moment compression in IoMT
Authors:
Mohamed Amine Tahiri
,
Ahmed Bencherqui
,
Hicham Karmouni
…
Reversible Image Steganography Scheme Based on a U-Net Structure
Authors:
Xintao Duan
,
Kai Jia
,
Baoxia Li
…
See all similar
Cited by
6
Linguistic Steganography Based on Adaptive Probability Distribution
Authors:
Xuejing Zhou
,
Wanli Peng
,
Boya Yang
…
Coverless Text Steganography Based on Maximum Variable Bit Embedding Rules
Authors:
Ning Wu
,
Poli Shang
,
Jin Fan
…
Detection of Generative Linguistic Steganography Based on Explicit and Latent Text Word Relation Mining Using Deep Learning
Authors:
Songbin Li
,
Jingang Wang
,
Peng Liu
See all cited by