2018
DOI: 10.1007/s11042-018-6541-0
|View full text |Cite
|
Sign up to set email alerts
|

Undetectable least significant bit replacement steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 21 publications
0
9
0
Order By: Relevance
“…Least Significant Bit Substitution (LSB) is one of the most widespread methods that can be easily realized to hide data [18,25]. The LSB substitution method is used in different ways in the literature [21,[26][27][28][29]. Pixel-Value Differencing (PVD) is another method commonly used in image steganography [30].…”
Section: Introductionmentioning
confidence: 99%
“…Least Significant Bit Substitution (LSB) is one of the most widespread methods that can be easily realized to hide data [18,25]. The LSB substitution method is used in different ways in the literature [21,[26][27][28][29]. Pixel-Value Differencing (PVD) is another method commonly used in image steganography [30].…”
Section: Introductionmentioning
confidence: 99%
“…The researchers on irreversible data hiding also achieves remarkable results [17][18][19][20][21][22][23][24][25], including the least significant bit (LSB) substitution [17,19], the exploiting modification direction (EMD) [20,21], and the magic matrix based (MMB) schemes [23,24], and so on. In LSB substitution method, LSBs of a cover pixel are replaced by secret binary bits of the same length.…”
Section: Introductionmentioning
confidence: 99%
“…This is not the case with the most secure adaptive methods, which require relatively complex software routines, more computational time, and in many cases additional secret data for complete message extraction. Due to its continued relevance, there has been some effort in recent years to improve the security of LSB embedding against some of the more successful traditional attacks [33], [34], [35], [36], [37], [38], [39], [40]. These efforts have primarily targeted the RS [2] and Sample Pairs analysis (SPA) [3], [4], and have generally sought to evade them by preserving the image statistics they target either by manipulating them prior to or after embedding, or via embedding strategies that preserve them in place.…”
Section: Introductionmentioning
confidence: 99%
“…With apparently normal set cardinalities, structural analyzers will be fooled into concluding that no hidden message is present. This kind of cover modification was presented as a defense against SPA in [40], and we extend it here to include Triples analysis. This extension is not straight-forward: to protect against all orders up to some order k, the statistics of n-tuples must be preserved, where n is the least common multiple of all orders up to and including k. We find that cover modifications in terms of sextuplets, required to preserve the statistics of both pairs and triplets, are highly constrained and result in cover images with virtually zero embedding capacity.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation