Modern Cryptography 2020
DOI: 10.1007/978-3-030-63115-4_16
|View full text |Cite
|
Sign up to set email alerts
|

Steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…It is an example of a dynamic system that typically exhibits chaotic behavior [22], [23]. The used Duffing map naturally considers a minor point (Xn, Yn) in the user plane and maps it to a new point given by (1). The trajectory and orbit are two practical terms used to properly designate the successful development of these non-static systems.…”
Section: Chaotic Mapsmentioning
confidence: 99%
See 1 more Smart Citation
“…It is an example of a dynamic system that typically exhibits chaotic behavior [22], [23]. The used Duffing map naturally considers a minor point (Xn, Yn) in the user plane and maps it to a new point given by (1). The trajectory and orbit are two practical terms used to properly designate the successful development of these non-static systems.…”
Section: Chaotic Mapsmentioning
confidence: 99%
“…By following a method that cannot be done by people who do not have the right to do so. In other words, just (only the person who sends the data and the recipient is the only one who can disclose and know confidential data) [1], [2]. There is a lot of research into both techniques of steganography, and some of this research are briefly described.…”
Section: Introductionmentioning
confidence: 99%