ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
20
views
0
references
Top references
cited by
144
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,011
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
Techniques for data hiding
Author(s):
W. Bender
,
D. Gruhl
,
N. Morimoto
,
A. Lu
Publication date
(Print):
1996
Journal:
IBM Systems Journal
Publisher:
IBM
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Abstract
Related collections
On Research Data Publishing
Author and article information
Journal
Title:
IBM Systems Journal
Abbreviated Title:
IBM Syst. J.
Publisher:
IBM
ISSN (Print):
0018-8670
Publication date Created:
1996
Publication date (Print):
1996
Volume
: 35
Issue
: 3.4
Pages
: 313-336
Article
DOI:
10.1147/sj.353.0313
SO-VID:
6e2f1102-ad0f-4d89-910c-6d86ce1eb36a
Copyright ©
© 1996
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
3,011
Coverless information hiding based on robust image hashing
Authors:
S. Zheng
High-Capacity Information Hiding Based on Residual Network
Authors:
Xintao Duan
,
Baoxia Li
,
Zimei Xie
…
Vehicle compartments as a hiding place for illegal drugs: an exploratory study
Authors:
D Decary-Hetu
,
B. DUPONT
,
D. SMALL
See all similar
Cited by
142
Quantization index modulation: a class of provably good methods for digital watermarking and information embedding
Authors:
B. Chen
,
G.W. Wornell
On the limits of steganography
Authors:
R.J. Anderson
,
F.A.P. Petitcolas
Exploring steganography: Seeing the unseen
Authors:
Neil F. Johnson
,
Sushil Jajodia
See all cited by