An overview of image steganography. T Morkel, JHP Eloff, MS Olivier ISSA 1 (2), 1-11, 2005 | 996 | 2005 |
Image steganography applications for secure communication T Morkel PQDT-Global, 2012 | 30 | 2012 |
Encryption techniques: a timeline approach T Morkel, JHP Eloff Information and Computer Security Architecture (ICSA) Research Group …, 2004 | 11 | 2004 |
Steganography and Steganalysis T Morkel Information and Computer Security Architecture (ICSA) Research Group, 2005 | 8 | 2005 |
The osn-tagging scheme: Recoverable steganography for online social networks T Morkel 2017 1st International Conference on Next Generation Computing Applications …, 2017 | 6 | 2017 |
Using image steganography for decryptor distribution T Morkel, JHP Eloff, MS Olivier On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops: OTM …, 2006 | 5 | 2006 |
J. and MS Olivier, M.“An Overview of Image Steganography” T Morkel, JH Eloff Annual Information Security South Africa Conference, 2005 | 2 | 2005 |
Self-sanitization of digital images using steganography T Morkel 2015 Information Security for South Africa (ISSA), 1-6, 2015 | 1 | 2015 |