Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Hiding the hidden message: approaches to textual steganography
George R.S. Weir, Michael Morran
International Journal of Electronic Security and Digital Forensics (IJESDF), 2010 Vol.3 No.3, pp.223 - 233
12 - 1 =

Thank you for your feedback.