ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
8
views
0
references
Top references
cited by
10
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,131
similar
All similar
Record
: found
Abstract
: not found
Report
: not found
Steganography: Past, Present, Future
report
Author(s):
J C Judge
Publication date
(Online):
December 01 2001
Publisher:
Office of Scientific and Technical Information (OSTI)
Read this article at
ScienceOpen
Publisher
Further versions
oa repository (via OAI-PMH title and first author match)
Powered by
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Heritage, Memory and Conflict Journal (HMC)
Author and article information
Journal
Publisher:
Office of Scientific and Technical Information (OSTI)
Publication date (Online):
December 01 2001
Article
DOI:
10.2172/15006450
SO-VID:
8b60ea79-bdc5-4ed0-a35e-54909e91bbcb
History
Product
Lawrence Livermore National Laboratory (LLNL)LLNL US Department of Energy (US)
Self URI (report):
http://www.osti.gov/servlets/purl/15006450/
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
2,131
Using contourlet transform and cover selection for secure steganography
Authors:
Hedieh Sajedi
,
Mansour Jamzad
,
H. Sajedi
…
Implementation of a steganography system based on hybrid square quaternion moment compression in IoMT
Authors:
Mohamed Amine Tahiri
,
Ahmed Bencherqui
,
Hicham Karmouni
…
Reversible Image Steganography Scheme Based on a U-Net Structure
Authors:
Xintao Duan
,
Kai Jia
,
Baoxia Li
…
See all similar
Cited by
9
A technique for digital steganography using chaotic maps
Authors:
Amir Anees
,
Adil Siddiqui
,
Jameel Ahmed
…
Privacy Threats of Acoustic Covert Communication among Smart Mobile Devices
Authors:
Li Duan
,
Kejia Zhang
,
Bo Cheng
…
Real-World Uses
Authors:
See all cited by