2020
DOI: 10.1109/cjece.2019.2938844
|View full text |Cite
|
Sign up to set email alerts
|

Reversible-Enhanced Stego Block Chaining Image Steganography: A Highly Efficient Data Hiding Technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…Finally, varied tools used for the cryptanalysis are precisely stated in this work. [27]. This work explain Support Vector Machine Algorithm is that protocol is population and vector based and makes use of the producer-scrounger model and the Data security.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Finally, varied tools used for the cryptanalysis are precisely stated in this work. [27]. This work explain Support Vector Machine Algorithm is that protocol is population and vector based and makes use of the producer-scrounger model and the Data security.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The compressed images were used for watermarking and steganography [10,11]. The security of the hidden information was further ensured using block-based data hiding techniques, namely stego block chaining (SBC), enhanced stego block chaining (ESBC), and reversible enhanced stego block chaining (RESBC) techniques [12,13].…”
Section: Introductionmentioning
confidence: 99%