2010
DOI: 10.1016/j.jss.2010.07.054
|View full text |Cite
|
Sign up to set email alerts
|

A perfect maze based steganographic method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 5 publications
0
13
0
Order By: Relevance
“…A maze basically consists of cells, walls, starting cell and end cell. Logically, a maze should have a complex path [10]. Many of the great mazes have a rectangular structure.…”
Section: Maze Generatorsmentioning
confidence: 99%
See 1 more Smart Citation
“…A maze basically consists of cells, walls, starting cell and end cell. Logically, a maze should have a complex path [10]. Many of the great mazes have a rectangular structure.…”
Section: Maze Generatorsmentioning
confidence: 99%
“…A rectangular maze is composed of m cell width and n cell height and expressed as m × n. If there is only one way between the two cells of the maze, it is called the perfect maze [11]. When security is considered, there must be only one exit of a maze [10]. The basic components of a maze are shown in Figure 3 [11].…”
Section: Maze Generatorsmentioning
confidence: 99%
“…In the presented work [15], maze game used as carrier media to hide the secret message. In the maze game there are many paths along with solution path, all the paths cell or pixel values are used to hide the secret information.…”
Section: Literature Reviewmentioning
confidence: 99%
“…(2) Kruskal's algorithm [7]. (3) Hunt-and-Kill maze generation (HKMZ) algorithm [8]. By using the DFS algorithm as an example, this method uses the stack as data structure.…”
Section: Maze Basicsmentioning
confidence: 99%