The platform will undergo maintenance on Sep 14 at about 9:30 AM EST and will be unavailable for approximately 1 hour.
2017
DOI: 10.1007/s11042-017-4946-9
|View full text |Cite
|
Sign up to set email alerts
|

New cubic reference table based image steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 61 publications
(14 citation statements)
references
References 21 publications
0
14
0
Order By: Relevance
“…Since steganography can also be utilized to conceal the private information, such as to provide privacy protection of medical images, as pointed out by one of the anonymous reviewers, besides Image Encryption and Decryption, Image Steganography is another worthy of noticing area in the field of Image Security. Interested readers are referred to the following informative writeups, although it is not within the scope of this work [ 24 , 25 ].…”
Section: Discussionmentioning
confidence: 99%
“…Since steganography can also be utilized to conceal the private information, such as to provide privacy protection of medical images, as pointed out by one of the anonymous reviewers, besides Image Encryption and Decryption, Image Steganography is another worthy of noticing area in the field of Image Security. Interested readers are referred to the following informative writeups, although it is not within the scope of this work [ 24 , 25 ].…”
Section: Discussionmentioning
confidence: 99%
“…The continuous growth of web services and e-commerce has encouraged many criminals and phishers to develop innovative methods to exploit and deceive novice users into sending out their financial information [1][2][3][4]. Although trojans, black hat search engine optimisation, forums, Internet relay chat, instant messaging, key-loggers, and screen captures are other methods used by phishers to steal the users' information, sending emails to target users by the phisher is still the most popular way of initiating the web phishing attacks [4,16,[25][26][27][28][29][30][31][32][33].…”
Section: Web Phishing Attackmentioning
confidence: 99%
“…(3) Extract log 2 σ bits from S, convert the extracted bits to a digit s σ in σ − ary notational system, and perform the APPM embedding technique to embed s σ into the quantization pair (â i ,b i ) by solving Equation (9). In case the solution cannot be found, return the previously extracted log 2 σ + m × m to S, modify (a i , b i ) to (a i , b i ) according to the Equation (10), and go to Step 4 for embedding one additional bit.…”
Section: Embedding Proceduresmentioning
confidence: 99%
“…According to the recoverability of the cover image, data-hiding methods can be classified into lossy [6][7][8][9][10][11][12][13][14] and lossless [15][16][17]. The least significant bit (LSB) matching [18] is one of the well-known lossy methods.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation