2015
DOI: 10.1016/j.aeue.2015.08.011
|View full text |Cite
|
Sign up to set email alerts
|

Reversible and adaptive image steganographic method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…The multimedia type includes video files of any format, audio files of any format, and image files. [1][2][3][4][5][6] The objective of this steganography technique is to share the information in a secret way that ensures privacy over the internet. This can also lead to a few advantages, including copyright preservation, detection of tampering image authentication and so on.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The multimedia type includes video files of any format, audio files of any format, and image files. [1][2][3][4][5][6] The objective of this steganography technique is to share the information in a secret way that ensures privacy over the internet. This can also lead to a few advantages, including copyright preservation, detection of tampering image authentication and so on.…”
Section: Introductionmentioning
confidence: 99%
“…Steganography is a method of hiding information into any digital media files, or in simple terms, it is known as multimedia. The multimedia type includes video files of any format, audio files of any format, and image files 1‐6 . The objective of this steganography technique is to share the information in a secret way that ensures privacy over the internet.…”
Section: Introductionmentioning
confidence: 99%
“…Steganography is paradigm that conceals the secret data into some digital medium in such a way so its existence cannot be noticed by human perception [1][2][3][4][5][6][7][8][9], see the study [10] for a recent review. With the rapid advancement and use of internet as communication channel, steganography has become an important and valuable tool for secure communication between sender and recipient without the snooping of third person.…”
Section: Introductionmentioning
confidence: 99%
“…Maheswari and Hemanth [7] utilized Fresnelet transform for frequency domain QR code-based image steganography. Tang et al [8] proposed a reversible and adaptive image steganographic algorithm based on interpolation. The researches [11][12][13][14][15][16][17][18][19][20] present the methods in which least significant bit works and in many methods experiments are performed on different levels of least significant bit position.…”
Section: Introductionmentioning
confidence: 99%