M Iranpour, F Farokhian - 2013 High Capacity Optical Networks …, 2013 - ieeexplore.ieee.org
The present paper proposes a novel method for grayscale image steganography which provides minimal distortion. The cover image is first divided into some blocks such that each …
PM Kumar - Journal of Telecommunications and Information …, 2011 - jtit.pl
Steganography is the approach for hiding any secret message in a variety of multimedia carriers like images, audio or video files. Whenever we are hiding a data, it is very important …
S Manaseer, A Aljawawdeh… - International Journal of …, 2017 - researchgate.net
Steganography is the science of hiding information using a digital media carrier in a way that prevents attackers and Intruders from revealing information and sharing it with others. Digital …
AK Mandal, MNM Kahar - International Journal of Signal Processing …, 2017 - academia.edu
Steganography has been emerged as a prominent technique for communicating secret information in a proper multimedia career. In image steganography, least significant bit …
Adaptive steganography methods tend to increase the security against attacks. Most of adaptive methods use LSB flipping (LSB-F) for embedding part of their algorithms. LSB-F is …
S Roy, MM Islam - SN Computer Science, 2022 - Springer
Steganography is a technique of hiding information in digital media such as images, text, audio, etc. This digital media is used as the cover to make the private message invisible …
HB Macit, A Koyun - Mühendislik Bilimleri ve Tasarım Dergisi, 2020 - dergipark.org.tr
A standard Least Significant Bit (LSB) algorithm changes average 50% of the least significant bits of an image. This causes approximately a 0.2% distortion on a grayscale …
T Pandikumar, T Gebreslassie - Int. Res. J. Eng. Technol, 2016 - researchgate.net
Over past few decades, with the advancement of communication technology the use of internet has grown extremely to exchange information without any distance barrier …
Substituting the least-significant-bits (LSBs) of an image is the easiest and most popular scheme in information hiding. Works have been done to point out this algorithm can be …