Aung, Nay Aung; Ko, Aye Chan
(Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
Nowadays, steganography plays a critical
role in Information Security. A number of
steganographic algorithms have been proposed
by focusing on this property of a steganographic
system. It is needed two bytes to hide ...