Author of the publication

Information Hiding into OBJ Format File Using Vector Steganography Techniques.

, , , and . SACI, page 91-96. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security sandbox based on RBAC model., , and . SACI, page 75-80. IEEE, (2016)Securing Distributed Computer Systems Using an Advanced Sophisticated Hybrid Honeypot Technology., , , , , , and . Comput. Informatics, 36 (1): 113-139 (2017)Agent-Based Model of the Spectrum Auctions with Sensing Imperfections in Dynamic Spectrum Access Networks., , , , , , , , and . Comput. Informatics, 36 (5): 1041-1062 (2017)Communication model of emuStudio emulation platform, , and . CoRR, (2010)Comparison of Filter Techniques for Two-Step Feature Selection., , , , , , , , and . Comput. Informatics, 36 (3): 597-617 (2017)Multi-Carrier Steganographic Algorithm Using File Fragmentation of FAT FS., , , , , and . Comput. Informatics, 38 (2): 343-366 (2019)Information Hiding into OBJ Format File Using Vector Steganography Techniques., , , and . SACI, page 91-96. IEEE, (2018)Subgraph Colouring Technique for Computer with Data Driven Computation Model., , , and . Acta Informatica Pragensia, 2 (2): 51-58 (2013)Mikroprogram pre riadenie procesu spájania operandov v architektúre DF KPI.. Acta Informatica Pragensia, 2 (2): 77-96 (2013)