2005
DOI: 10.1016/j.amc.2004.04.059
|View full text |Cite
|
Sign up to set email alerts
|

Steganography of capacity required using modulo operator for embedding secret image

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
56
0
2

Year Published

2009
2009
2015
2015

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 70 publications
(58 citation statements)
references
References 13 publications
0
56
0
2
Order By: Relevance
“…To improve the quality of the stego-image more efficiently, mostsignificant-bits (MSBs) are modified in some of LSB approaches (Lee and Chen, 2000;Wang, 2005;Chan and Chen, 2004). Moreover, to consider the characteristic of the human visual system, the approaches with variable sizes of LSBs have been proposed (Lee and Chen, 2000;Wang, 2005;Yang et al, 2008).…”
Section: Introductionmentioning
confidence: 98%
See 1 more Smart Citation
“…To improve the quality of the stego-image more efficiently, mostsignificant-bits (MSBs) are modified in some of LSB approaches (Lee and Chen, 2000;Wang, 2005;Chan and Chen, 2004). Moreover, to consider the characteristic of the human visual system, the approaches with variable sizes of LSBs have been proposed (Lee and Chen, 2000;Wang, 2005;Yang et al, 2008).…”
Section: Introductionmentioning
confidence: 98%
“…One of well-known steganographic techniques is leastsignificant-bit (LSB) substitution, which replaces the least significant bits of the cover image with secret bits (Lee and Chen, 2000;Wang et al, 2000;Chang et al, 2003;Wang, 2005;Yang and Wang, 2006;Yang, 2008;Chan and Chen, 2004;Yang et al, 2008). LSB approaches usually receive a considerably high capacity and remain a good quality.…”
Section: Introductionmentioning
confidence: 99%
“…A novel mechanism using modulus operations for embedding secret data into a cover image is proposed by Wang, S.J. They use modulus operation for selecting threshold that indicates how many bits of the secret image are being incorporated into the cover image [20].…”
Section: Literature Surveymentioning
confidence: 99%
“…Because of hiding the fact of communications, steganography has broad applications in modern digital signal processing and security communications. In the most recent years, many steganography methods are invented [1][2][3][4][5][6][7][8][9][10] . Those algorithms can be mainly classified into two classes.…”
Section: Introductionmentioning
confidence: 99%
“…Those algorithms can be mainly classified into two classes. The first class is to hide constant bits for each hiding unit like the LSB hiding algorithm [1][2] , hiding based predictive coding [3] . However, according to the characteristics of the human visual perception capability we know that the different areas with the different local characteristic can tolerate different amounts of changes.…”
Section: Introductionmentioning
confidence: 99%