2015
DOI: 10.1007/978-3-319-13731-5_46
|View full text |Cite
|
Sign up to set email alerts
|

A New Approach for Data Hiding with LSB Steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…In Sahu & Swain (2020) , a study of LSB image steganographic recent advances were conducted to improve steganographic performance, such as resilience, integration capacity, and the ability to find secret knowledge. In Prashanti & Sandhyarani (2015) , the authors propose two strategies; the first strategy involves using data or hidden messages in the Image, while the second involves inserting a secret grey image within another grey image. The four-state table, which generates pseudorandom numbers, is employed for these strategies.…”
Section: Related Workmentioning
confidence: 99%
“…In Sahu & Swain (2020) , a study of LSB image steganographic recent advances were conducted to improve steganographic performance, such as resilience, integration capacity, and the ability to find secret knowledge. In Prashanti & Sandhyarani (2015) , the authors propose two strategies; the first strategy involves using data or hidden messages in the Image, while the second involves inserting a secret grey image within another grey image. The four-state table, which generates pseudorandom numbers, is employed for these strategies.…”
Section: Related Workmentioning
confidence: 99%
“…Then, according to majority principle, each element is evaluated and the value that is repeated more times is used to reconstruct the coded signal W ′ c . Finally, W ′ c are decoded by BCH (15,7,2), resulting in the recovered watermark W ′ . Table 2 shows only the summary of the extraction process.…”
Section: Watermark Extractionmentioning
confidence: 99%
“…For ACAI, we found that the optimal parameters are given by ∆ = 24 , BCH (15,7,2) and repetition code (1,3). Figure 4 shows the comparison of the watermarked anaglyphs with the original ones performing no attacks at different values for ∆ .…”
Section: Parameter Selectionmentioning
confidence: 99%
See 2 more Smart Citations