2020
DOI: 10.1007/978-3-030-58703-1_9
|View full text |Cite
|
Sign up to set email alerts
|

Using Least-Significant Bit and Random Pixel Encoding with Encryption for Image Steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…The proposed crypto-steganography approach is established based on the introduced image steganography algorithm presented in [ 40 ]. The crypto-steganography approach comprises two algorithms; Algorithm 1: the ransomware hiding process, and Algorithm 2: the ransomware extraction process as indicated in Figure 1 .…”
Section: Proposed Crypto-steganography Approachmentioning
confidence: 99%
“…The proposed crypto-steganography approach is established based on the introduced image steganography algorithm presented in [ 40 ]. The crypto-steganography approach comprises two algorithms; Algorithm 1: the ransomware hiding process, and Algorithm 2: the ransomware extraction process as indicated in Figure 1 .…”
Section: Proposed Crypto-steganography Approachmentioning
confidence: 99%