Data Hiding Technique using Catalan-Lucas Number Sequence
نویسندگان
چکیده
منابع مشابه
Data Hiding Techniques using number decompositions
-------------------------------------------------------------------ABSTRACT-----------------------------------------------------------------Data hiding is the art of embedding data into digital media in a way such that the existence of data remains concealed from everyone except the intended recipient. In this paper, we discuss the various Least Significant Bit (LSB) data hiding techniques. We ...
متن کاملLossless Data Hiding Technique using Reversible Function
The most of the previous lossless data hiding techniques are that secret data are embedded into cover image. So, the relationship between the embedding capacity and PSNR of these techniques is always an inverse proportion. In contrast, the embedded position information of secret data are embedded into a location map in the proposed technique in order to achieve thedirectly proportional relation...
متن کاملReversible Data Hiding Using Improved Interpolation Technique
Reversible Data hiding is a process of hiding information into a cover image. There are various techniques used for hiding secret data. Audio, video, image, text, and picture can be used as a cover medium in data hiding. In images, Reversible Data Hiding (RDH) is a method which is very helpful in the recovery of original cover after the inserted message is extracted. This vital method is broadl...
متن کاملBinomial Coefficients , Catalan Numbers and Lucas Quotients
Let p be an odd prime and let a, m ∈ Z with a > 0 and p ∤ m. In this paper we determine p a −1 k=0 2k k+d /m k mod p 2 for d = 0, 1; for example, p a −1 k=0 2k k m k ≡ m 2 − 4m p a + m 2 − 4m p a−1 u p−(m 2 −4m p) (mod p 2), where (−) is the Jacobi symbol and {u n } n0 is the Lucas sequence given by u 0 = 0, u 1 = 1 and u n+1 = (m − 2)u n − u n−1 (n = 1, 2, 3,. . .). As an application, we deter...
متن کاملSteganography- A Data Hiding Technique
Steganography is the art of hiding information and an effort to conceal the existence of the embedded information. It serves as a better way of securing message than cryptography which only conceals the content of the message not the existence of the message. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable. In this paper we w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indian Journal of Science and Technology
سال: 2017
ISSN: 0974-5645,0974-6846
DOI: 10.17485/ijst/2017/v10i4/110896