Authentication of data hiding using co-occurrence matrix

This research is considered one of the steps aiming to deal with one of the most important challenges facing communicators via Internet, as a means for ensuring information security and verifying the authenticity and credibility of the received message. The research designs and implements proposed s...

Full description

Saved in:
Bibliographic Details
Main Authors: Melad saeed, Ghada thanoon
Format: Article
Language:English
Published: Mosul University 2012-07-01
Series:Al-Rafidain Journal of Computer Sciences and Mathematics
Subjects:
Online Access:https://csmj.mosuljournals.com/article_163688_6ff19f1efece1ea842a0db0a69df711b.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!