Open hiding for truncating hackers - a block truncation and wavelet approach
Crossref DOI link: https://doi.org/10.1007/s11042-018-6549-5
Published Online: 2018-08-31
Published Print: 2019-04
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Lakshmi, C.
Thenmozhi, K.
Rayappan, John Bosco Balaguru
Amirtharajan, Rengarajan https://orcid.org/0000-0003-1574-3045
Text and Data Mining valid from 2018-08-31
Article History
Received: 8 January 2018
Revised: 12 June 2018
Accepted: 15 August 2018
First Online: 31 August 2018