Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/ih/JohnsonJ98
%A Johnson, Neil F.
%A Jajodia, Sushil
%B Information Hiding
%D 1998
%E Aucsmith, David
%I Springer
%K dblp
%P 273-289
%T Steganalysis of Images Created Using Current Steganography Software.
%U http://dblp.uni-trier.de/db/conf/ih/ih98.html#JohnsonJ98
%V 1525
%@ 3-540-65386-4
@inproceedings{conf/ih/JohnsonJ98,
added-at = {2017-05-21T00:00:00.000+0200},
author = {Johnson, Neil F. and Jajodia, Sushil},
biburl = {https://www.bibsonomy.org/bibtex/27ccb7840a985e76501f4f44a187c8a50/dblp},
booktitle = {Information Hiding},
crossref = {conf/ih/1998},
editor = {Aucsmith, David},
ee = {https://doi.org/10.1007/3-540-49380-8_19},
interhash = {94ae940ed9ecd09393b82a3e560c0d37},
intrahash = {7ccb7840a985e76501f4f44a187c8a50},
isbn = {3-540-65386-4},
keywords = {dblp},
pages = {273-289},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2019-05-15T15:55:03.000+0200},
title = {Steganalysis of Images Created Using Current Steganography Software.},
url = {http://dblp.uni-trier.de/db/conf/ih/ih98.html#JohnsonJ98},
volume = 1525,
year = 1998
}