Journal articles on the topic 'Indicator-based least significant bit (LSB) method'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Indicator-based least significant bit (LSB) method.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Myo, Ma Ma, Zar Hnin Zar, and Min Htwe Yin. "Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 970–74. https://doi.org/10.5281/zenodo.3589923.
Full textRafailov, Radostin. "Parallel steganographic algorithm based on least significant bit." E3S Web of Conferences 508 (2024): 04018. http://dx.doi.org/10.1051/e3sconf/202450804018.
Full textCanistya Chandra, Putu Isthu, and I. Ketut Gede Suhartana. "Web-based Image Steganography Application to Hide Secret Messages." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 9, no. 3 (2021): 375. http://dx.doi.org/10.24843/jlk.2021.v09.i03.p08.
Full textKurniasih, Firda, Rini Marwati, and Ririn Sispiyati. "Penggabungan Affine Cipher dan Least Significant Bit-2 untuk Penyisipan Pesan Rahasia pada Gambar." Jurnal EurekaMatika 11, no. 2 (2023): 79–88. http://dx.doi.org/10.17509/jem.v11i2.62115.
Full textNashat, Dalia, and Loay Mamdouh. "A Least Significant Bit Steganographic Method Using Hough Transform Technique." Journal of Networking and Network Applications 3, no. 2 (2023): 73–80. http://dx.doi.org/10.33969/j-nana.2023.030203.
Full textHsing-Han Liu, Hsing-Han Liu, Sheng-Chih Ho Hsing-Han Liu, and Tai-Hsiu Wu Sheng-Chih Ho. "An Image Steganographic Scheme Based on Edge Detection and Least Significant Bit Substitution." 網際網路技術學刊 24, no. 5 (2023): 1027–41. http://dx.doi.org/10.53106/160792642023092405002.
Full textAbdullah, Sarah Faeq, and Shahir Fleyeh Nawaf. "Optimizing Data Security with Hybrid Scheme Based on LSB and DWT." Tikrit Journal of Engineering Sciences 30, no. 3 (2023): 190–99. http://dx.doi.org/10.25130/tjes.30.3.17.
Full textHutabarat, Allwine, and Riza Sawitri. "Text Data Embedding into Images Using Chaotic Least Significant Bit Encod-ing Steganography." Jurnal Pepadun 5, no. 3 (2024): 286–98. https://doi.org/10.23960/pepadun.v5i3.246.
Full textKhalid, Kadhim Jabbar, Bahir Tuieb Munthir, and A. Thajeel Salam. "Digital watermarking by utilizing the properties of selforganization map based on least significant bit and most significant bit." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 6 (2022): 6545–58. https://doi.org/10.11591/ijece.v12i6.pp6545-6558.
Full textSusilawati Mohamad, Fatma, and Nurul Sahira Mohd Yasin. "Information Hiding Based on Audio Steganography using Least Significant Bit." International Journal of Engineering & Technology 7, no. 4.15 (2018): 536. http://dx.doi.org/10.14419/ijet.v7i4.15.28363.
Full textModupe, Alade Oluwaseun, Amusan Elizabeth Adedoyin, and Adedeji Oluyinka Titilayo. "A Comparative Analysis of LSB, MSB and PVD Based Image Steganography." International Journal of Research and Review 8, no. 9 (2021): 373–77. http://dx.doi.org/10.52403/ijrr.20210948.
Full textYunus, Mahmuddin, and Agus Harjoko. "Penyembunyian Data pada File Video Menggunakan Metode LSB dan DCT." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 8, no. 1 (2014): 81. http://dx.doi.org/10.22146/ijccs.3498.
Full textHutapea, Destri Yanti, and Octaviani Hutapea. "WATERMARKING METHOD OF REMOTE SENSING DATA USING STEGANOGRAPHY TECHNIQUE BASED ON LEAST SIGNIFICANT BIT HIDING." International Journal of Remote Sensing and Earth Sciences (IJReSES) 15, no. 1 (2018): 63. http://dx.doi.org/10.30536/j.ijreses.2018.v15.a2824.
Full textGanesh, R., and S. Thabasu Kannan. "A Capable System for Hiding Image in an Image." Asian Journal of Engineering and Applied Technology 6, no. 2 (2017): 14–17. http://dx.doi.org/10.51983/ajeat-2017.6.2.822.
Full textJuneja, Kapil. "Region Secure and Pattern Based Alternate 2B-3C Steganography Approach for Data Security in Color Images." International Journal of Sensors, Wireless Communications and Control 9, no. 3 (2019): 330–44. http://dx.doi.org/10.2174/2210327909666181217124423.
Full textMu’azu, Abubakar Aminu, and Kauthar Kabir. "Hybrid of Least Significant Bits and most Significant Bits for Improving Security and Quality of Digital Image Steganography." WSEAS TRANSACTIONS ON COMPUTERS 22 (December 12, 2023): 253–62. http://dx.doi.org/10.37394/23205.2023.22.29.
Full textWin, Win Maw, and San Lwin San. "Text Embedded System using LSB Method." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 1818–22. https://doi.org/10.5281/zenodo.3591533.
Full textDella Patresya Sitohang, Purba Lamdippos Hendry Parmadi, Vinela Br Sitepu, and Wilhelmus Wanzerhasratman Gulo. "Video Based Steganography (Motion Vector Steganography)." Jurnal Teknik Indonesia 2, no. 01 (2023): 33–38. https://doi.org/10.58471/ju-ti.v2i01.662.
Full textYoussef, Taouil, and Bachir Ameur El. "Steganographic Scheme Based on Message-Cover matching." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 3594–603. https://doi.org/10.11591/ijece.v8i5.pp3594-3603.
Full textKadhim Jabbar, Khalid, Munthir Bahir Tuieb, and Salam A. Thajeel. "Digital watermarking by utilizing the properties of self-organization map based on least significant bit and most significant bit." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 6 (2022): 6545. http://dx.doi.org/10.11591/ijece.v12i6.pp6545-6558.
Full textNoor Azam, Muhammad Harith, Farida Ridzuan, and M. Norazizi Sham Mohd Sayuti. "A New Method to Estimate Peak Signal to Noise Ratio for Least Significant Bit Modification Audio Steganography." Pertanika Journal of Science and Technology 30, no. 1 (2022): 497–511. http://dx.doi.org/10.47836/pjst.30.1.27.
Full textMoon, Cheol Woo, Kwang Sub Yoon, and Jonghwan Lee. "A 12~14-Bit SAR-SS Hybrid ADC with SS Bit Shifting Resolution Reconfigurable Method for Bio-Signal Processing." Electronics 12, no. 24 (2023): 4916. http://dx.doi.org/10.3390/electronics12244916.
Full textYe, Jiajun. "Advancements in Spatial Domain Image Steganography: Techniques, Applications, and Future Outlook." Applied and Computational Engineering 94, no. 1 (2024): 6–19. http://dx.doi.org/10.54254/2755-2721/94/2024melb0058.
Full textMajumder, Jayeeta, and Chittaranjan Pradhan. "An interpolation based steganographic technique with least significant-bit and pixel value differencing in a pixel block." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 2 (2022): 1074–82. https://doi.org/10.11591/ijeecs.v27.i2.pp1074-1082.
Full textMajumder, Jayeeta, and Chittaranjan Pradhan. "An interpolation based steganographic technique with least-significant-bit and pixel value differencing in a pixel block." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 2 (2022): 1074. http://dx.doi.org/10.11591/ijeecs.v27.i2.pp1074-1082.
Full textPooja Belagali, Dr. V. R. Udupi. "Robust Image Steganography Based on Hybrid Edge Detection." Tuijin Jishu/Journal of Propulsion Technology 44, no. 3 (2023): 1509–21. http://dx.doi.org/10.52783/tjjpt.v44.i3.531.
Full textS.Azhagu, Senthil. "IMAGE STEGANOGRAPHY BASED ON LSB MATCHING TECHNIQUE USING SECRET SHARING METHOD." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 4 (2019): 312–15. https://doi.org/10.5281/zenodo.2653584.
Full textAdhimah, Laily Farkhah, Isti Nurhafiyah, Adnan Aditya Muntahar, Fandi Kristiaji, and Dinar Mustofa. "Implementasi Aplikasi Steganografi Berbasis Web Menggunakan Algoritma LSB dan BPCS." Komputa : Jurnal Ilmiah Komputer dan Informatika 12, no. 2 (2023): 100–108. http://dx.doi.org/10.34010/komputa.v12i2.10319.
Full textAlshammari, Kaznah. "Exposing the most match parity bit approach (MMPB-A) for data concealment in digital images." International Journal of ADVANCED AND APPLIED SCIENCES 11, no. 8 (2024): 57–65. http://dx.doi.org/10.21833/ijaas.2024.08.007.
Full textAshiq Abdul Khader, Muhammed, Saranya Kavileswarapu, Ritika Sarkar, and Sannasi Ganapathy. "SECURE TEXT IN IMAGE STEGANOGRAPHY USING PIXEL-BASED ALGORITHM." International Journal of Engineering Applied Sciences and Technology 7, no. 1 (2022): 338–42. http://dx.doi.org/10.33564/ijeast.2022.v07i01.052.
Full textParaskevov, Hristo, Aleksandar Stefanov, and Borislav Stoyanov. "YASH: YET ANOTHER STEGO HIDING." Annals of the Academy of Romanian Scientists Series on Mathematics and Its Application 12, no. 1-2 (2020): 238–45. http://dx.doi.org/10.56082/annalsarscimath.2020.1-2.238.
Full textChan, Chi-Shiang, and Chin-Chen Chang. "An Image Hiding Scheme Based on Multi-bit-reference Substitution Table Using Dynamic Programming Strategy." Fundamenta Informaticae 65, no. 4 (2005): 291–305. https://doi.org/10.3233/fun-2005-65401.
Full textRatama, Niki, and Munawaroh Munawaroh. "Implementasi Metode Kriptografi dengan Menggunakan Algoritma RC4 dan Steganografi Least Significant Bit Dalam Mengamankan Data Berbasis Android." JURNAL MEDIA INFORMATIKA BUDIDARMA 6, no. 2 (2022): 1272. http://dx.doi.org/10.30865/mib.v6i2.3902.
Full textMahdi, Sally A., and Maisa’a A. Khodher. "An Improved Method for Combine (LSB and MSB) Based on Color Image RGB." Engineering and Technology Journal 39, no. 1B (2021): 231–42. http://dx.doi.org/10.30684/etj.v39i1b.1574.
Full textBadr, Aymen Mudheher, Mohamed layth Talal, and Ghassan Sabeh. "Image in Image Steganography based on modified Advanced Encryption Standard and Lest Significant Bit Algorithms." JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 26, no. 8 (2018): 112–21. http://dx.doi.org/10.29196/jubpas.v26i8.1676.
Full textMadhusudhan, K. N., and P. Sakthivel. "Combining Digital Signature with Local Binary Pattern-Least Significant Bit Steganography Techniques for Securing Medical Images." Journal of Medical Imaging and Health Informatics 10, no. 6 (2020): 1288–93. http://dx.doi.org/10.1166/jmihi.2020.3015.
Full textBarrios, Gabriel Nicoh, Youzelle Migo Gundayao, Francis Emanuel Santoyo, et al. "Modified Least Significant Bit Algorithm Applied in Digital Image Signature." International Journal of Computing Sciences Research 8 (January 1, 2024): 3010–26. https://doi.org/10.25147/ijcsr.2017.001.1.200.
Full textJalid, Alfian Abdul, Agus Harjoko, and Anny Kartika Sari. "Steganographic Model for encrypted messages based on DNA Encoding." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 15, no. 1 (2021): 43. http://dx.doi.org/10.22146/ijccs.61767.
Full textHiswara, Abrar, Aida Fitriyani, and Reza Adi Nugraha. "SISTEM STEGANOGRAPHY DENGAN METODE LEAST SIGNIFCANT BIT (LSB) & METODE CAESAR CIPHER BERBASIS ANDROID." Jurnal Informatika 20, no. 1 (2020): 78–88. http://dx.doi.org/10.30873/ji.v20i1.1615.
Full textZhang, Jiaqi, Dongpo Zhang, and Shang Zhang. "A Digital Image Steganographic Detection Method for LSB Steganography." International Journal of Computer Science and Information Technology 4, no. 2 (2024): 256–63. http://dx.doi.org/10.62051/ijcsit.v4n2.33.
Full textGao, Feng, and Fang Fang Yang. "Analysis on the Impact of the Data Acquisition Board on the Performance Indicators of the Virtual Multi-Channel Pulse Height Analyzer." Applied Mechanics and Materials 519-520 (February 2014): 1209–13. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.1209.
Full textMohsin, Nadia A., and Huda A. Alameen. "A Hybrid Method for Payload Enhancement in Image Steganography Based on Edge Area Detection." Cybernetics and Information Technologies 21, no. 3 (2021): 97–107. http://dx.doi.org/10.2478/cait-2021-0032.
Full textArya, Meenakshi S., Meenu Rani, and Charndeep Singh Bedi. "Improved Capacity Image Steganography Algorithm using 16-Pixel Differencing with n-bit LSB Substitution for RGB Images." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (2016): 2735. http://dx.doi.org/10.11591/ijece.v6i6.10792.
Full textArya, Meenakshi S., Meenu Rani, and Charndeep Singh Bedi. "Improved Capacity Image Steganography Algorithm using 16-Pixel Differencing with n-bit LSB Substitution for RGB Images." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (2016): 2735. http://dx.doi.org/10.11591/ijece.v6i6.pp2735-2741.
Full textTütüncü, Kemal, and Özcan Çataltaş. "Compensation of degradation, security, and capacity of LSB substitution methods by a new proposed hybrid n-LSB approach." Computer Science and Information Systems, no. 00 (2021): 48. http://dx.doi.org/10.2298/csis210227048t.
Full textZalata, Mohamad K. Abu, Mohamad T. Barakat, and Ziad A. Alqadi. "Carrier Image Rearrangement to Enhance the Security Level of LSB Method of Data Steganography." International Journal of Computer Science and Mobile Computing 11, no. 1 (2022): 182–93. http://dx.doi.org/10.47760/ijcsmc.2022.v11i01.024.
Full textD.Rathna, Kishore, D.Suneetha, Babu P.Narendra, and P.Chinababu. "Deep Convolutional Neural Network based Image Steganogrpahy Technique for Audio-Image Hiding Algorithm." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 4 (2020): 2187–89. https://doi.org/10.35940/ijeat.D7843.049420.
Full textRajput, Prof Vaishali, Soham Ambar, Yash Ambodekar, et al. "F.Y.B.Tech Students’ Engineering Design and Innovation (EDAI 2) Project Paper, SEM 2 A.Y. 2023-24 Vishwakarma Institute of Technology, Pune, INDIA." International Journal of Advances in Engineering and Management 6, no. 11 (2024): 512–16. https://doi.org/10.35629/5252-0611512516.
Full textTayh Albderi, Ali Jaber, Dhiah Al-Shammary, and Lamjed Ben Said. "Jaccard-based Random Distribution with Least and Most Significant Bit Hiding Methods for Highly Patients MRI Protected Privacy." JOIV : International Journal on Informatics Visualization 7, no. 3-2 (2023): 1032. http://dx.doi.org/10.30630/joiv.7.3-2.2385.
Full textBarakat, Mohamad Tariq, Rushdi Abu Zneit, and Ziad A. Alqadi. "Crypto-Steganographic Method to Protect Secret Messages." International Journal of Computer Science and Mobile Computing 10, no. 12 (2021): 46–61. http://dx.doi.org/10.47760/ijcsmc.2021.v10i12.007.
Full text