2015 23nd Signal Processing and Communications Applications Conference (SIU) 2015
DOI: 10.1109/siu.2015.7130009
|View full text |Cite
|
Sign up to set email alerts
|

LSB based steganography over video files using Koblitz's Method

Abstract: Özetçe-Bu çalışmada Eliptik Eğri Kriptografisi (ECC) üzerinde Koblitz Metodu kullanılarak video dosyaları içine EnÖnemsiz Bit (LSB) tabanlı bilgi gizlenmesi amaçlanmıştır. Alıcıya iletilmek istenen mesaj ASCII karakterlerine dönüştürüldükten sonra, tek indise sahip karakterler Koblitz Metoduyla şifrelenerek (x,y) ikilileri elde edilir ve bu ikililerin koordinat noktalarını ifade ettiği varsayılır. Tek indise sahip bu noktaların ilgili frame üzerindeki piksel değeri, kendinden sonra gelen çift indisli ASCII kar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…Classic methods can include methods, such as those based on the least significant bit [ 23 , 24 , 25 ] or methods based on frequency domain manipulation (discrete wavelet transform, discrete Fourier transform, discrete sine, and cosine transform) [ 10 , 26 , 27 , 28 , 29 , 30 , 31 ]. There are many modifications of these methods, such as a combination of the least significant bit method and those based on manipulation of the frequency domain, which includes publications concerning hybrid domains [ 23 , 32 , 33 , 34 ].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Classic methods can include methods, such as those based on the least significant bit [ 23 , 24 , 25 ] or methods based on frequency domain manipulation (discrete wavelet transform, discrete Fourier transform, discrete sine, and cosine transform) [ 10 , 26 , 27 , 28 , 29 , 30 , 31 ]. There are many modifications of these methods, such as a combination of the least significant bit method and those based on manipulation of the frequency domain, which includes publications concerning hybrid domains [ 23 , 32 , 33 , 34 ].…”
Section: Literature Reviewmentioning
confidence: 99%