Contents
Academic literature on the topic 'Indicator-based least significant bit (LSB) method'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Indicator-based least significant bit (LSB) method.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Indicator-based least significant bit (LSB) method"
Myo, Ma Ma, Zar Hnin Zar, and Min Htwe Yin. "Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 970–74. https://doi.org/10.5281/zenodo.3589923.
Full textRafailov, Radostin. "Parallel steganographic algorithm based on least significant bit." E3S Web of Conferences 508 (2024): 04018. http://dx.doi.org/10.1051/e3sconf/202450804018.
Full textCanistya Chandra, Putu Isthu, and I. Ketut Gede Suhartana. "Web-based Image Steganography Application to Hide Secret Messages." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 9, no. 3 (2021): 375. http://dx.doi.org/10.24843/jlk.2021.v09.i03.p08.
Full textKurniasih, Firda, Rini Marwati, and Ririn Sispiyati. "Penggabungan Affine Cipher dan Least Significant Bit-2 untuk Penyisipan Pesan Rahasia pada Gambar." Jurnal EurekaMatika 11, no. 2 (2023): 79–88. http://dx.doi.org/10.17509/jem.v11i2.62115.
Full textNashat, Dalia, and Loay Mamdouh. "A Least Significant Bit Steganographic Method Using Hough Transform Technique." Journal of Networking and Network Applications 3, no. 2 (2023): 73–80. http://dx.doi.org/10.33969/j-nana.2023.030203.
Full textHsing-Han Liu, Hsing-Han Liu, Sheng-Chih Ho Hsing-Han Liu, and Tai-Hsiu Wu Sheng-Chih Ho. "An Image Steganographic Scheme Based on Edge Detection and Least Significant Bit Substitution." 網際網路技術學刊 24, no. 5 (2023): 1027–41. http://dx.doi.org/10.53106/160792642023092405002.
Full textAbdullah, Sarah Faeq, and Shahir Fleyeh Nawaf. "Optimizing Data Security with Hybrid Scheme Based on LSB and DWT." Tikrit Journal of Engineering Sciences 30, no. 3 (2023): 190–99. http://dx.doi.org/10.25130/tjes.30.3.17.
Full textHutabarat, Allwine, and Riza Sawitri. "Text Data Embedding into Images Using Chaotic Least Significant Bit Encod-ing Steganography." Jurnal Pepadun 5, no. 3 (2024): 286–98. https://doi.org/10.23960/pepadun.v5i3.246.
Full textKhalid, Kadhim Jabbar, Bahir Tuieb Munthir, and A. Thajeel Salam. "Digital watermarking by utilizing the properties of selforganization map based on least significant bit and most significant bit." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 6 (2022): 6545–58. https://doi.org/10.11591/ijece.v12i6.pp6545-6558.
Full textSusilawati Mohamad, Fatma, and Nurul Sahira Mohd Yasin. "Information Hiding Based on Audio Steganography using Least Significant Bit." International Journal of Engineering & Technology 7, no. 4.15 (2018): 536. http://dx.doi.org/10.14419/ijet.v7i4.15.28363.
Full textBook chapters on the topic "Indicator-based least significant bit (LSB) method"
Alwahbani, Samah M. H., and Huwaida T. I. Elshoush. "Hybrid Audio Steganography and Cryptography Method Based on High Least Significant Bit (LSB) Layers and One-Time Pad—A Novel Approach." In Studies in Computational Intelligence. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69266-1_21.
Full textLu Tzu-Chuen, Hsueh Sue-Chen, Tseng Chun-Ya, and Chen Pei-Lun. "Information Hiding Scheme based on Replace Function and Wavelet Transform." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2015. https://doi.org/10.3233/978-1-61499-484-8-885.
Full textP. Wagh, Dnyaneshwari, Fadewar H. S, and Shinde G. N. "A Finger Vein Security System Using DNA Encryption, LSB Data Hiding and Image Scrambling." In Artificial Intelligence and Communication Technologies, 2023rd ed. Soft Computing Research Society, 2023. http://dx.doi.org/10.52458/978-81-955020-5-9-79.
Full textChaudhary, Ankit, and Sandeep Kumar. "Utilizing Image Color Channels for High Payload Embedding." In Handbook of Research on Emerging Perspectives in Intelligent Pattern Recognition, Analysis, and Image Processing. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8654-0.ch006.
Full textShet, Sathish, A. R. Aswath, M. C. Hanumantharaju, and Xiao-Zhi Gao. "Design of Reconfigurable Architectures for Steganography System." In Applied Video Processing in Surveillance and Monitoring Systems. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1022-2.ch007.
Full textKumar, Arvind, Stuti Tandon, Shalesh Deorari, and Rajeev Kumar. "Steganography: Unveiling Techniques and Research Agenda." In Steganography - The Art of Hiding Information [Working Title]. IntechOpen, 2024. http://dx.doi.org/10.5772/intechopen.1005052.
Full text