Research Article
MIMIC-PPT: Mimicking-Based Steganography for Microsoft Power Point Document

Citation to this article as recorded by ASCI
. : -.

Amirtharajan, R., P. Muralidharan, R. Rajesh, R. Sridevi and J.B.B. Rayappan, 2013. Short message (service) as key for steganography. Res. J. Inform. Technol., 5: 113-124.
CrossRef  |  Direct Link  |  

Wang Li, Gang Luo, Lingyun Xiang 2014. An Automatically Changing Feature Method based on Chaotic Encryption Inform. Technol. J., 13: 2404-2410.
CrossRef  |  

Xiang, L., X. Sun, Y. Liu and H. Yang, 2011. A secure steganographic method via multiple choice questions. Inform. Technol. J., 10: 992-1000.
CrossRef  |  Direct Link  |  

Zhou, X.L., F.X. Yu, Y.C. Wen and Z.M. Lu, 2011. A novel protection architecture scheme for EPON. Inform. Technol. J., 10: 591-596.
CrossRef  |  Direct Link  |  

Related Articles in ASCI
Search in Google Scholar
View Citation
Report Citation

©  2021 Science Alert. All Rights Reserved