Search alternatives:
"mid" » "mind"

1
Published 2015
Springer Berlin Heidelberg
...Since the mid 1990s, data hiding has been proposed as an enabling technology for securing...

2
Published 2008
Springer Berlin Heidelberg
...Since the mid 1990s, data hiding has been proposed as an enabling technology for securing...

3
Published 2011
Springer Berlin Heidelberg
...Since the mid 1990s, data hiding has been proposed as an enabling technology for securing...

4
Published 2010
Springer Berlin Heidelberg
...Since the mid 1990s, data hiding has been proposed as an enabling technology for securing...

5
Published 2014
Springer Berlin Heidelberg
...Since the mid 1990s, data hiding has been proposed as an enabling technology for securing...

6
Published 2009
Springer Berlin Heidelberg
...Since the mid 1990s, data hiding has been proposed as an enabling technology for securing...

7
Published 2007
Springer Berlin Heidelberg
...Since the mid 1990s, data hiding has been proposed as an enabling technology for securing...

8
Published 2012
Springer Berlin Heidelberg
...Since the mid 1990s, data hiding has been proposed as an enabling technology for securing...