2018
DOI: 10.1016/j.icte.2018.01.003
|View full text |Cite
|
Sign up to set email alerts
|

Improved chaos-based video steganography using DNA alphabets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
19
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(24 citation statements)
references
References 8 publications
0
19
0
Order By: Relevance
“…The stego file is directly built. For example, authors of LSB methods [3,8,9] extract the quantized samples in binary and replace the least significant bits of each sample by a secret bit. These works, including our previous papers [2,7], are well-known in terms of the simplicity of extracting the secret message.…”
Section: Audio Data Hiding Based On Time Domainmentioning
confidence: 99%
See 1 more Smart Citation
“…The stego file is directly built. For example, authors of LSB methods [3,8,9] extract the quantized samples in binary and replace the least significant bits of each sample by a secret bit. These works, including our previous papers [2,7], are well-known in terms of the simplicity of extracting the secret message.…”
Section: Audio Data Hiding Based On Time Domainmentioning
confidence: 99%
“…Currently, data hiding topic implies as the most well-known and adopted solution that is used for securing the transmitted information [1]. The solution happens by hiding the data known as a secret message within another file called cover, which can be either a grayscale or color image, compressed or uncompressed audio, video, or text file [2][3][4].…”
Section: Introductionmentioning
confidence: 99%
“…The discrete cosine transform (DCT) is applied to the LSB of an image's pixel values to generate a compressed steganography image. An emerging steganographic field based on DNA has been proposed by researchers as a new data hiding method [2]. One gram of DNA may hold up to 215 petabytes of data.…”
Section: Introductionmentioning
confidence: 99%
“…For instance, chaos is applied in communication systems in An et al (2011), Eisencraft et al (2012), Hu et al (2010), Jiang et al (2011), Kaddoum et al (2010), Kang et al (2014), Ryu and Lee (2013), Türk and Oğraş (2011), Yang et al (2015), Yang and Zhu (2013); used for image cryptosystems in , Z. L. Zhu et al (2011), Murillo-Escobar et al (2015), Oğraş and Türk (2016), Patidar et al (2011), Telem et al (2014), Wang et al (2011), Ye (2011), Ye and Guo (2014), N. Zhou et al (2011), and H. Zhu et al (2013); for power systems in Yibei et al (2011), Ginarsa et al (2013), Yau et al (2015), Ghasemi et al,(2014), ; X. Zhou et al (2012); Tur and Ogras (2021); for Steganographic systems in Ogras (2019), Kar et al (2018), Bilal et al (2014), Battikh et al (2014), and Saeed (2013). There are also some important studies using chaotic systems as secret key or bit generators in cryptography (Addabbo et al, 2009;Alhadawi et al, 2019;Moysis et al, 2020;Oğraş & Mustafa, 2017).…”
Section: Introductionmentioning
confidence: 99%