Academic literature on the topic 'Indicator-based least significant bit (LSB) method'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Indicator-based least significant bit (LSB) method.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Indicator-based least significant bit (LSB) method"

1

Myo, Ma Ma, Zar Hnin Zar, and Min Htwe Yin. "Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 970–74. https://doi.org/10.5281/zenodo.3589923.

Full text
Abstract:
Security of data is one of the most challenging problems in todays technological world. In order to secure the transmission of secret data over the public network Internet , numerous data security and hiding algorithms have been developed in the last decade. Steganography combined with cryptography can be one of the best choices for solving this problem. In this paper, the proposed framework is the dual layer of security, in which the first layer is to encrypt the secret text message using advanced encryption standard AES algorithm and in the second layer to embed this message using the indica
APA, Harvard, Vancouver, ISO, and other styles
2

Rafailov, Radostin. "Parallel steganographic algorithm based on least significant bit." E3S Web of Conferences 508 (2024): 04018. http://dx.doi.org/10.1051/e3sconf/202450804018.

Full text
Abstract:
The paper suggests a parallel algorithm for the implementation of the LSB steganographic method. The possibilities of parallel programming are presented. The proposed steganographic parallel algorithm is compared to an algorithm using sequential embedding of the hidden message (using one-core processor). It is established that the algorithm produces accurate statistical results.
APA, Harvard, Vancouver, ISO, and other styles
3

Canistya Chandra, Putu Isthu, and I. Ketut Gede Suhartana. "Web-based Image Steganography Application to Hide Secret Messages." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 9, no. 3 (2021): 375. http://dx.doi.org/10.24843/jlk.2021.v09.i03.p08.

Full text
Abstract:
The Internet has become a very popular medium for communicating and exchanging information data. However, with the development of technology, information data theft is becoming more frequent so it is very necessary to maintain the security of information data. To maintain the security of information data, steganography can be used, namely hiding data or information to a medium. Least Significant Bit (LSB) is a method that can be used to perform the insertion. The Least Significant Bit (LSB) replaces the insignificant or smallest bit value so that when an insertion is done, the difference is no
APA, Harvard, Vancouver, ISO, and other styles
4

Kurniasih, Firda, Rini Marwati, and Ririn Sispiyati. "Penggabungan Affine Cipher dan Least Significant Bit-2 untuk Penyisipan Pesan Rahasia pada Gambar." Jurnal EurekaMatika 11, no. 2 (2023): 79–88. http://dx.doi.org/10.17509/jem.v11i2.62115.

Full text
Abstract:
As technology develops, improving message security is very important. One approach that can be taken to improve message security is to combine cryptography and steganography. In this study, the authors combined Affine Cipher cryptographic and Least Significant Bit-2 (LSB-2) steganography. In this merge method, the Affine Cipher cryptography is applied first, then, the encrypted message is inserted into an image using LSB-2. Specifically, LSB-2 is a modification of the Least Significant Bit (LSB) method which works by exchanging the sixth bits of each pixel color element in the image with the b
APA, Harvard, Vancouver, ISO, and other styles
5

Nashat, Dalia, and Loay Mamdouh. "A Least Significant Bit Steganographic Method Using Hough Transform Technique." Journal of Networking and Network Applications 3, no. 2 (2023): 73–80. http://dx.doi.org/10.33969/j-nana.2023.030203.

Full text
Abstract:
Steganography is a data-hiding scientific branch that aims to hide secret data in an image, video, or audio. Image steganography methods try to embed a large amount of data into images with high imperceptibility. However, increasing the number of embedded data in the image decreases its quality. Therefore, in this paper, a new method based on Least Significant Bit (LSB) using Hough Transform is proposed to improve the stego image quality with increasing the amount of embedded data. The LSB is the common embedding steganography method due to its simplicity of implementation and low complexity.
APA, Harvard, Vancouver, ISO, and other styles
6

Hsing-Han Liu, Hsing-Han Liu, Sheng-Chih Ho Hsing-Han Liu, and Tai-Hsiu Wu Sheng-Chih Ho. "An Image Steganographic Scheme Based on Edge Detection and Least Significant Bit Substitution." 網際網路技術學刊 24, no. 5 (2023): 1027–41. http://dx.doi.org/10.53106/160792642023092405002.

Full text
Abstract:
<p>This work presents a steganographic scheme based on Laplacian-of-Gaussian (LoG) edge detection and least significant bit (LSB) substitution. The cover image is first divided into continuous and non-overlapping 4×4-pixel blocks. The pixel at the top left corner of each block (first pixel) is defined as the reference pixel. After the LoG edge detection, the blocks are classified as edge or non-edge blocks, and this information is embedded in the reference pixels. Each non-reference pixel is then embedded with 5 bits and 4 bits of cipher text if it belongs to an edge block or n
APA, Harvard, Vancouver, ISO, and other styles
7

Abdullah, Sarah Faeq, and Shahir Fleyeh Nawaf. "Optimizing Data Security with Hybrid Scheme Based on LSB and DWT." Tikrit Journal of Engineering Sciences 30, no. 3 (2023): 190–99. http://dx.doi.org/10.25130/tjes.30.3.17.

Full text
Abstract:
One of the most popular techniques in image steganography is the Least Significant Bit (LSB) operation, which involves inserting secret data into the cover image's pixels' least significant bit. However, the amount of secret data that can be concealed in the cover image depends on the number of bits used for embedding. In this paper, a novel hybrid steganographic system based on Discrete Wavelet Transform (DWT) and Least Significant Bit (LSB) for image steganography is proposed. The proposed scheme aims to optimize data security by utilizing LSB and DWT techniques to embed secret data into an
APA, Harvard, Vancouver, ISO, and other styles
8

Hutabarat, Allwine, and Riza Sawitri. "Text Data Embedding into Images Using Chaotic Least Significant Bit Encod-ing Steganography." Jurnal Pepadun 5, no. 3 (2024): 286–98. https://doi.org/10.23960/pepadun.v5i3.246.

Full text
Abstract:
Computer networks and the internet are growing rapidly, enabling global communication and exchange of information, including text, images, video and audio. However, this progress has also fueled cybercrime, such as data theft. One solution to protect data is steganography, the art of hiding a message in another medium. With the advancement of digital technology, steganography now utilizes digital image files as hidden message containers. Chaotic LSB (Least Significant Bit) based steganography method is implemented in this steganography application. This technique determines the location of mes
APA, Harvard, Vancouver, ISO, and other styles
9

Khalid, Kadhim Jabbar, Bahir Tuieb Munthir, and A. Thajeel Salam. "Digital watermarking by utilizing the properties of selforganization map based on least significant bit and most significant bit." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 6 (2022): 6545–58. https://doi.org/10.11591/ijece.v12i6.pp6545-6558.

Full text
Abstract:
Information security is one of the most important branches concerned with maintaining the confidentiality and reliability of data and the medium for which it is transmitted. Digital watermarking is one of the common techniques in this field and it is developing greatly and rapidly due to the great importance it represents in the field of reliability and security. Most modern watermarking systems, however, use the self-organization map (SOM), which is safer than other algorithms because an unauthorized user cannot see the result of the SOM's training. Our method presents a semi-fragile wate
APA, Harvard, Vancouver, ISO, and other styles
10

Susilawati Mohamad, Fatma, and Nurul Sahira Mohd Yasin. "Information Hiding Based on Audio Steganography using Least Significant Bit." International Journal of Engineering & Technology 7, no. 4.15 (2018): 536. http://dx.doi.org/10.14419/ijet.v7i4.15.28363.

Full text
Abstract:
Steganography is the idea of hiding private or sensitive data or information within something that appears to be nothing out of the normal. A few problems arise especially in securing data and information when the information had been lost or stolen from unauthorized user. Traditionally, we give information manually using paper; it is possible that the information could be stolen by unauthorized user. The main objective of this study is to hide secret information in audio, so that other persons will not notice the presence of the information. The proposed method of this study is by using Least
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Indicator-based least significant bit (LSB) method"

1

Alwahbani, Samah M. H., and Huwaida T. I. Elshoush. "Hybrid Audio Steganography and Cryptography Method Based on High Least Significant Bit (LSB) Layers and One-Time Pad—A Novel Approach." In Studies in Computational Intelligence. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69266-1_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lu Tzu-Chuen, Hsueh Sue-Chen, Tseng Chun-Ya, and Chen Pei-Lun. "Information Hiding Scheme based on Replace Function and Wavelet Transform." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2015. https://doi.org/10.3233/978-1-61499-484-8-885.

Full text
Abstract:
This paper proposes an information hiding method that ex-ploits the Integer Wavelet Transform (IWT) and Replace Function. First, the cover image is transformed into frequency coefficients through the IWT. Then, Run-Length Encoding (RLE) technique is used to compress the secret message. Furthermore, the compression result is embedded into the frequency coefficients by using the Modulus Function and Least Significant Bit (LSB) Matching. When the receiver receives the stego image, the compression result can be obtained from the frequency coefficients of the stego image by using the Modulus Functi
APA, Harvard, Vancouver, ISO, and other styles
3

P. Wagh, Dnyaneshwari, Fadewar H. S, and Shinde G. N. "A Finger Vein Security System Using DNA Encryption, LSB Data Hiding and Image Scrambling." In Artificial Intelligence and Communication Technologies, 2023rd ed. Soft Computing Research Society, 2023. http://dx.doi.org/10.52458/978-81-955020-5-9-79.

Full text
Abstract:
Finger vein technology is a secure biometric solution, reliable and non-invasive that provides authentication from fast and highly accurate identity to access data or secure areas. The personal information security in cyberspace has gradually become an important topic nowadays, and biometric identification technology has emerged as the times require. Finger vein authenticated person information security is another prominent problem in the research area. So, by combining the information security and finger vein image security will improve the security of the whole system. This paper proposes a
APA, Harvard, Vancouver, ISO, and other styles
4

Chaudhary, Ankit, and Sandeep Kumar. "Utilizing Image Color Channels for High Payload Embedding." In Handbook of Research on Emerging Perspectives in Intelligent Pattern Recognition, Analysis, and Image Processing. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8654-0.ch006.

Full text
Abstract:
Steganography is the technique which has been used in many fields for hiding information and many different versions for each application are available in the literature. This chapter demonstrates how to increase the security level and to improve the storage capacity of hidden data, with compression techniques. The security level is increased by randomly distributing the text message over the entire image instead of clustering within specific image portions. The degradation of the images can be minimized by changing only one least significant bit per color channel for hiding the message. Using
APA, Harvard, Vancouver, ISO, and other styles
5

Shet, Sathish, A. R. Aswath, M. C. Hanumantharaju, and Xiao-Zhi Gao. "Design of Reconfigurable Architectures for Steganography System." In Applied Video Processing in Surveillance and Monitoring Systems. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1022-2.ch007.

Full text
Abstract:
The most crucial task in real-time processing of image or video steganography algorithms is to reduce the computational delay and increase the throughput of a steganography embedding and extraction system. This problem is effectively addressed by implementing steganography hiding and extraction methods in reconfigurable hardware. This chapter presents a new high-speed reconfigurable architectures that have been designed for Least Significant Bit (LSB) and multi-bit based image steganography algorithm that suits Field Programmable Gate Arrays (FPGAs) or Application Specific Integrated Circuits
APA, Harvard, Vancouver, ISO, and other styles
6

Kumar, Arvind, Stuti Tandon, Shalesh Deorari, and Rajeev Kumar. "Steganography: Unveiling Techniques and Research Agenda." In Steganography - The Art of Hiding Information [Working Title]. IntechOpen, 2024. http://dx.doi.org/10.5772/intechopen.1005052.

Full text
Abstract:
Steganography techniques focus on command-based and tool-based approaches for concealing digital information within diverse media formats. This study analyzes the functionalities of methodologies, implementation intricacies, and their potential advancements. Examining the intricacies of command-based steganography elucidates the intricate process of concealing data within digital files using terminal commands, thereby highlighting the Least Significant Bit (LSB) technique through command-line operations. This study highlights functionalities and user interfaces of prominent steganography tools
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!