z-logo
open-access-imgOpen Access
Video Steganography Based on Hash Polynomial Function for Secure Communication Use Fourier Transform with Security Method for Mounting of Multilayer Security
Author(s) -
R. Umadevi,
G. M. Nasira
Publication year - 2015
Publication title -
indian journal of science and technology
Language(s) - English
Resource type - Journals
eISSN - 0974-6846
pISSN - 0974-5645
DOI - 10.17485/ijst/2015/v8i23/85289
Subject(s) - computer science , steganography , hash function , cryptographic hash function , theoretical computer science , computer network , algorithm , computer security , image (mathematics) , computer vision

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here