2020
DOI: 10.11591/ijece.v10i1.pp935-946
|View full text |Cite
|
Sign up to set email alerts
|

Image steganography using least significant bit and secret map techniques

Abstract: In steganography, secret data are invisible in cover media, such as text, audio, video and image. Hence, attackers have no knowledge of the original message contained in the media or which algorithm is used to embed or extract such message. Image steganography is a branch of steganography in which secret data are hidden in host images. In this study, image steganography using least significant bit and secret map techniques is performed by applying 3D chaotic maps, namely, 3D Chebyshev and 3D logistic maps, to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
42
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 49 publications
(46 citation statements)
references
References 20 publications
0
42
0
Order By: Relevance
“…In [25], the proposed technique embeds English text into the wave audio using tone insertion method, which generates two frequency f1 and f2 and inserts them into an audio file in a suitable power level according to the specific stego-table. In [26] steganography of image is suggested using LSB and secret map techniques. The study is based on the principle of random insertion and the select of a pixel from a host image.…”
Section: Introductionmentioning
confidence: 99%
“…In [25], the proposed technique embeds English text into the wave audio using tone insertion method, which generates two frequency f1 and f2 and inserts them into an audio file in a suitable power level according to the specific stego-table. In [26] steganography of image is suggested using LSB and secret map techniques. The study is based on the principle of random insertion and the select of a pixel from a host image.…”
Section: Introductionmentioning
confidence: 99%
“…This comparison produces an evaluation of the average minimum no. of bits that are needed to encode a sequence of bits based on the frequency of the symbol [17].…”
Section: =mentioning
confidence: 99%
“…The results are presented in Figures 8 and 9. The results show that both algorithms have a uniform histogram [21,29,30]. Figure 8.…”
Section: Histogrammentioning
confidence: 99%