On the use of the Stirling Transform in image steganography

Title
On the use of the Stirling Transform in image steganography
Authors
Keywords
Steganography, Stirling transform, Inverse stirling transform, Payload, One time password, MD5
Journal
Journal of Information Security and Applications
Volume 46, Issue -, Pages 320-330
Publisher
Elsevier BV
Online
2018-04-23
DOI
10.1016/j.jisa.2018.04.003

Ask authors/readers for more resources

Reprint

Contact the author

Publish scientific posters with Peeref

Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.

Learn More

Find the ideal target journal for your manuscript

Explore over 38,000 international journals covering a vast array of academic fields.

Search