Publication | Closed Access
A secured image steganography method based on ballot transform and genetic algorithm
28
Citations
27
References
2022
Year
Data HidingEngineeringSteganalysisBallot TransformBiometricsInformation HidingGenetic AlgorithmInformation ForensicsSteganographyMultimedia SecurityCryptography
| Year | Citations | |
|---|---|---|
Page 1
Page 1