2022
DOI: 10.53730/ijhs.v6ns3.7552
|View full text |Cite
|
Sign up to set email alerts
|

Image steganography based on LSB using various scanning methods in spatial domain

Abstract: Data security plays a vital role in the field of Information Technology. Cryptography and Steganography methods are widely used to enforce security efficiently. In Spatial Domain, many steganography methods are available such as LSB, PVD etc. These existing methods always suffer from the quality, security trade off. In this paper, we proposed an enhanced LSB method to deal with such tradeoffs. The proposed method achieves the goal by employing variable embedding patterns and the results with optimized PSNR, MS… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Furthermore, image steganography uses image as cover object and inserts the secret information using different reported methods such as spatial domain, frequency domains etc. The extensive surveys of the image steganography are presented in [10][11][12][13][14]. Every existing method has their advantages and disadvantages in terms of payload, security, perception, temper protection, and computation which are the basic criteria of steganography as well as the basic needs for any steganographic methods shown in Fig.…”
Section: Intrucductionmentioning
confidence: 99%
“…Furthermore, image steganography uses image as cover object and inserts the secret information using different reported methods such as spatial domain, frequency domains etc. The extensive surveys of the image steganography are presented in [10][11][12][13][14]. Every existing method has their advantages and disadvantages in terms of payload, security, perception, temper protection, and computation which are the basic criteria of steganography as well as the basic needs for any steganographic methods shown in Fig.…”
Section: Intrucductionmentioning
confidence: 99%