2017
DOI: 10.5815/ijisa.2017.08.04
|View full text |Cite
|
Sign up to set email alerts
|

Graphical Data Steganographic Protection Method Based on Bits Correspondence Scheme

Abstract: Abstract-The proposed method of graphical data protection is a combined crypto-steganographic method. It is based on a bit values transformation according to both a certain Boolean function and a specific scheme of correspondence between MSB and LSB. The scheme of correspondence is considered as a secret key. The proposed method should be used for protection of large amounts of secret graphical data.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(6 citation statements)
references
References 13 publications
0
3
0
2
Order By: Relevance
“…Soil samples were taken in the surface layer at a depth of 0-5 cm. Separation of micromycetes from soil and root washes was performed by dilution [32][33][34][35][36][37][38][39][40][41][42]. Cultivation of the studied samples was performed at a temperature of 26-28 • C. Isolated cultures were studied in a light microscope MBI-6 according to the method adopted in mycological research [43].…”
Section: Mycological Soil Analysismentioning
confidence: 99%
“…Soil samples were taken in the surface layer at a depth of 0-5 cm. Separation of micromycetes from soil and root washes was performed by dilution [32][33][34][35][36][37][38][39][40][41][42]. Cultivation of the studied samples was performed at a temperature of 26-28 • C. Isolated cultures were studied in a light microscope MBI-6 according to the method adopted in mycological research [43].…”
Section: Mycological Soil Analysismentioning
confidence: 99%
“…Стеганографічне вбудовування секретних даних виконується за принципом різницевого перетворення бітів [10] із використанням результату логічних операцій [11]. Метод використовує природні властивості аудіоданих, а саме їх надлишковість.…”
Section: формулювання методуunclassified
“…де kрозмір контейнера, mрозмір метаданих, sрозмір секретних даних. Результати оцінювання характеристик базового методу LSB-стеганографії [1,2], методу на основі різницевого перетворення біт [10] і запропонованого методу наведено в табл. 2.…”
Section: аналіз розробленого методуunclassified
“…These ideas can also be found in monitoring and control systems and in the field of data protection, when transmitting signals in measuring channels [12][13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%