Articles with "least significant" as a keyword



Photo by miracleday from unsplash

Undetectable least significant bit replacement steganography

Sign Up to like & get
recommendations!
Published in 2018 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-018-6541-0

Abstract: In this paper we propose a novel method based on Inverse Transitions for increasing the security of Least Significant Bit (LSB) replacement steganography. Before hiding data using LSB replacement, cover image is preprocessed using inverse… read more here.

Keywords: replacement steganography; least significant; steganography; lsb replacement ... See more keywords
Photo by usgs from unsplash

Image steganography using least significant bit and secret map techniques

Sign Up to like & get
recommendations!
Published in 2020 at "International Journal of Electrical and Computer Engineering"

DOI: 10.11591/ijece.v10i1.pp935-946

Abstract: In steganography, secret data are invisible in cover media, such as text, audio, video and image. Hence, attackers have no knowledge of the original message contained in the media or which algorithm is used to… read more here.

Keywords: steganography using; image; using least; least significant ... See more keywords
Photo from wikipedia

ACO Based Variable Least Significant Bits Data Hiding in Edges Using IDIBS Algorithm

Sign Up to like & get
recommendations!
Published in 2020 at "Symmetry"

DOI: 10.3390/sym12050781

Abstract: This work presents a double asymmetric data hiding technique. The first asymmetry is created by hiding secret data in the complex region of the cover image and keep the smooth region unaffected. Then another asymmetry… read more here.

Keywords: least significant; hiding; aco based; variable least ... See more keywords