2016
DOI: 10.1016/j.procs.2016.03.114
|View full text |Cite
|
Sign up to set email alerts
|

A Modified High Frequency Adaptive Security Approach using Steganography for Region Selection based on Threshold Value

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 10 publications
0
8
0
1
Order By: Relevance
“…In the (2), Si,j= Stego-video and Yi,j= Cover video. The two parameters X and Y indicated the total numbers of the pixels of video frames for two dimensions [97]. Therefore, MSE is important to measure to evaluate the quality of stego-video and test its modification rate.…”
Section: Mse and Psnr Measurementsmentioning
confidence: 99%
“…In the (2), Si,j= Stego-video and Yi,j= Cover video. The two parameters X and Y indicated the total numbers of the pixels of video frames for two dimensions [97]. Therefore, MSE is important to measure to evaluate the quality of stego-video and test its modification rate.…”
Section: Mse and Psnr Measurementsmentioning
confidence: 99%
“…Na técnica do sistema de substituição, os bits redundantes ou desnecessários são subistituidos de uma imagem de cobertura pelos bits da mensagem secreta usando, por exemplo, o método Bit Menos Significativo (LSB, do inglês, Least Significant Bit) para codificar a mensagem secreta. No entanto, a esteganografia do LSB é suscetível as técnicas de análise de esteganização [4]. Para evitar a instalação de detecção de esteganografia através do uso do método LSB, em [5], foi proposta uma nova estratégia de substituição dos bits.…”
Section: Introductionunclassified
“…The main steganographic methods in the spatial domain [ 3 , 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 ] are LSB-based (Low Significant Bit). Recently, entropy has also been extensively used to support data-hiding algorithms [ 18 , 19 , 20 ].…”
Section: Introductionmentioning
confidence: 99%