نتایج جستجو برای: lsb matching

تعداد نتایج: 103032  

Journal: :Journal of King Saud University - Computer and Information Sciences 2019

2011
Tu-Thach Quach

Locating steganographic payload using Weighted Stego-image (WS) residuals has been proven successful provided a large number of stego images are available. In this paper, we revisit this topic with two goals. First, we argue that it is a promising approach to locate payload by showing that in the ideal scenario where the cover images are available, the expected number of stego images needed to ...

2013
Amit Singh Susheel Jain Anurag Jain

In this paper new algorithm proposed for digital watermarking using Least Significant Bit (LSB) .LSB already used but there is a slightly effect on the image. The above algorithm is using LSB & second LSB bit. Here we used binary value of watermark text in LSB, and in place of second LSB, the inverse of their correspond LSB bit. The proposed algorithm is flexible depending on the length of wate...

2011
Emad T. Khalaf Norrozila Sulaiman

Many researchers are working on information hiding techniques using different ideas and areas to hide their secrete data. This paper introduces a robust technique of hiding secret data in image based on LSB insertion and RSA encryption technique. The key of the proposed technique is to encrypt the secret data. Then the encrypted data will be converted into a bit stream and divided it into numbe...

Journal: :International Journal of Computer Applications 2016

Journal: :Journal of Multimedia 2012
Yifeng Sun Danmei Niu Guangming Tang Zhanzhan Gao

This paper proposes an optimized LSB matching steganography based on Fisher Information. The embedding algorithm is designed to solve the optimization problem, in which Fisher information is the objective function and embedding transferring probabilities are variables to be optimized. Fisher information is the quadratic function of the embedding transferring probabilities, and the coefficients ...

2014
Tomás Denemark Jessica J. Fridrich

This paper is an attempt to analyze the interaction between Alice and Warden in Steganography using the Game Theory. We focus on the modern steganographic embedding paradigm based on minimizing an additive distortion function. The strategies of both players comprise of the probabilistic selection channel. The Warden is granted the knowledge of the payload and the embedding costs, and detects em...

D.R. Notter M.A.M.Y. Khandoker M.M. Mia, M.O. Faruque S.S. Husain

The objective of this study was to evaluate genetic and phenotypic parameters for some reproductive traits of Black Bengal does. Genetic parameters were estimated by Residual Maximum Likelihood procedure, fitting an animal model ignoring maternal genetic or permanent environmental effects. The least-squares means of litter size at birth (LSB), litter size at weaning (LSW), litter weight at birt...

Journal: :Govarî zankoy Helebce 2022

Steganography is a technique used to disguise the existence of secret communication. It in many fields solve information security problems. embed data carrier image and obtain new that can't actually be distinguished from original image. This paper proposes steganography method based on least significant bit (LSB) replacement integer wavelet transform IWT through lifting scheme achieve high qua...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید