Indian Journal of Science and Technology
Year: 2016, Volume: 9, Issue: 39, Pages: 1-5
A. Jeyasekar* , Deepti Bisht and Akshit Dua
Keywords: Exploit Delivery Technique, Image Hacking, Least Significant Bit, Malicious Code, Steganography, Stegosploit
Subscribe now for latest articles and news.