Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2
Pages
|
Viewing 1-10 of 12 total results
(PDF) A novel steganography technique by mapping words ...
We have proposed a new steganography method deploying adaptive least significant bit (LSB) substitution and PVD. The gray scale image is partitioned in 3×3 or 3×3 plus 2×2 pixel blocks.
 A Secure Image Steganography Based on RSA Algorithm and ...
The Least Significant Bit insertion varies according to number of bits in an image [16]. For an 8-bit image, the least significant bit i.e. the 8th bit of each byte of the image will be changed by the 1-bit of secret message. For 24 bit image, the colors of each component like RGB (red, green and blue) will be changed. LSB steganography...
 A Novel Approach for Image Steganography using LCG
modification, interception and sniffing normally exist. Steganography is a common security technique that is utilized to solve or reduce those problems. A large number of methods is used for implementing steganography; as least significant bits (LSB), discrete cosine transform (DCT), discrete Fourier...
 Hiding And Encrypting Binary Images Using A Different Approach
Image steganography techniques can be divided into following domains. 1. Spatial Domain Methods: There are many versi ons of spatial steganography, all directly change some bits in the image pixel values in hiding data. Least significant bit (LSB) -based steganography is...
Comparative Study of Spatial Domain Image Steganography ...
In this method the messages are embedded into cover image by replacing the least significant bits of the image directly. The hiding capacity can be increased by using up to 4 least significant bits in each pixel which is also quite hard to detect [16, 18, 3]. 1.2 MSB Steganography This method is a slight modification of the LSB steganography....
A Secure Image Steganography based on RSA Algorithm and ...
The Hash based Least Significant Bit (H-LSB) technique for steganography in which position of LSB for hiding the secret data is deermined using hash function. Hash function finds the positions of least significant bit of each RGB pixels and then message bits are embedded into these RGB pixels independently....
 Hiding Data in Video Sequences using RC6 Algorithm
This method uses the Least Significant Bits (LSB) insertion to hide data within encrypted image data. The binary representation of the each hidden data is used to overwrite the LSB of each byte within the encrypted image randomly. The Least significant bit replacement method is effectively used for data hiding process....
Comparative study of digital audio steganography ...
Also known as LSB (Least Significant Bit), this method is one of the earliest methods used for information hiding. Traditionally, It is based on embedding each bit from the message in the least significant bit of the cover audio in a deterministic way (see Figure3). Thus, for a 16 kHz sampled audio, 16 kbps of data are hidden....
Perancangan Aplikasi Stegakrip Dengan Metode LSB Dan ...
Information hiding using least significant bit steganography and cryptography. International Journal of Modern Education and Computer Science, 4(6), 27-34. Jain, Y. K., & Ahirwal, R. R. (2010). A novel image steganography method with adaptive number of least significant bits modification based on private stego-keys.
Adaptive LSB Steganography Based on Chaos Theory and ...
Free Online Library: Adaptive LSB Steganography Based on Chaos Theory and Random Distortion.(least significant bits, Technical report) by "Advances in Electrical and Computer Engineering"; Science and technology, general Algorithms Analysis Research Applied research Data security Methods Image processing...
1 2
Pages
|