Journal articles on the topic 'Least significant bit matching'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Least significant bit matching.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Tseng, Hsien-Wen, and Hui-Shih Leng. "A reversible modified least significant bit (LSB) matching revisited method." Signal Processing: Image Communication 101 (February 2022): 116556. http://dx.doi.org/10.1016/j.image.2021.116556.
Full textXia, Zhihua, Xinhui Wang, Xingming Sun, and Baowei Wang. "Steganalysis of least significant bit matching using multi-order differences." Security and Communication Networks 7, no. 8 (2013): 1283–91. http://dx.doi.org/10.1002/sec.864.
Full textPristiwanto, Pristiwanto, and Abdul Halim Hasugian. "Steganography Formation by utilizing Enhanced Least Significant Bit Algorithm." Jurnal Info Sains : Informatika dan Sains 11, no. 1 (2021): 19–22. http://dx.doi.org/10.54209/infosains.v11i1.38.
Full textAkhrameeva, K. A., and E. U. Gerling. "COMPARATIVE ANALYSIS OF STEGOSYSTEMS WITH EMBEDDING IN THE LEAST SIGNIFICANT BITS WITH MATCHING AND SUBSTITUTION." H&ES Research 12, no. 6 (2020): 38–47. http://dx.doi.org/10.36724/2409-5419-2020-12-6-38-47.
Full textLi, Wenxiang, Tao Zhang, Ran Wang, and Yan Zhang. "Quantitative steganalysis of least significant bit matching revisited for consecutive pixels." Journal of Electronic Imaging 23, no. 1 (2014): 013025. http://dx.doi.org/10.1117/1.jei.23.1.013025.
Full textKhalid, Kadhim Jabbar, Bahir Tuieb Munthir, and A. Thajeel Salam. "Digital watermarking by utilizing the properties of selforganization map based on least significant bit and most significant bit." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 6 (2022): 6545–58. https://doi.org/10.11591/ijece.v12i6.pp6545-6558.
Full textXiong, Gang, Xi-jian Ping, Tao Zhang, and Bing Sun. "An Approach of Detecting Least Significant Bit Matching Based on Image Content." Journal of Electronics & Information Technology 34, no. 6 (2012): 1380–87. http://dx.doi.org/10.3724/sp.j.1146.2011.00932.
Full textXia, Zhihua, Shufang Wang, Xingming Sun, and Baowei Wang. "Steganalysis of least significant bit matching based on image histogram and correlation." Journal of Electronic Imaging 22, no. 3 (2013): 033008. http://dx.doi.org/10.1117/1.jei.22.3.033008.
Full textAfrakhteh, Masoud, and Jeong-A. Lee. "Adaptive least significant bit matching revisited with the help of error images." Security and Communication Networks 8, no. 3 (2014): 510–15. http://dx.doi.org/10.1002/sec.998.
Full textTurkhamun Adi Kurniawan and Wahyudi Syahputra. "IMPLEMENTASI ALGORITMA LEAST SIGNIFICANT BIT MACHING UNTUK MENGAMANKAN DATA RAHASIA PERUSAHAAN." JURNAL LIMITS 18, no. 01 (2023): 1–7. http://dx.doi.org/10.59134/jlmt.v18i01.200.
Full textLiu, Qingzhong, Andrew H. Sung, Bernardete Ribeiro, Mingzhen Wei, Zhongxue Chen, and Jianyun Xu. "Image complexity and feature mining for steganalysis of least significant bit matching steganography." Information Sciences 178, no. 1 (2008): 21–36. http://dx.doi.org/10.1016/j.ins.2007.08.007.
Full textKadhim Jabbar, Khalid, Munthir Bahir Tuieb, and Salam A. Thajeel. "Digital watermarking by utilizing the properties of self-organization map based on least significant bit and most significant bit." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 6 (2022): 6545. http://dx.doi.org/10.11591/ijece.v12i6.pp6545-6558.
Full textYoussef, Taouil, and Bachir Ameur El. "Steganographic Scheme Based on Message-Cover matching." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 3594–603. https://doi.org/10.11591/ijece.v8i5.pp3594-3603.
Full textSaravanan, D., N. Sivaprasad, and Dennis Joseph. "Information Trouncing Via Slightest Momentous Spot System Procedure." International Journal of Engineering & Technology 7, no. 3.27 (2018): 488. http://dx.doi.org/10.14419/ijet.v7i3.27.18002.
Full textS.Azhagu, Senthil. "IMAGE STEGANOGRAPHY BASED ON LSB MATCHING TECHNIQUE USING SECRET SHARING METHOD." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 4 (2019): 312–15. https://doi.org/10.5281/zenodo.2653584.
Full textRaja, P. M. Siva, and E. Baburaj. "Secret Data Hiding Scheme with Least Significant Bit Matching Revisited Image Steganography based on Novel E-Coli Bacterial Foraging Optimization Model." Asian Journal of Research in Social Sciences and Humanities 6, no. 7 (2016): 807. http://dx.doi.org/10.5958/2249-7315.2016.00465.2.
Full textTaouil, Youssef, and El Bachir Ameur. "Steganographic Scheme based on Message-Cover matching." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 3594. http://dx.doi.org/10.11591/ijece.v8i5.pp3594-3603.
Full textWan, Peiyuan, Limei Su, Hongda Zhang, and Zhijie Chen. "A Power-Efficient Pipelined ADC with an Inherent Linear 1-Bit Flip-Around DAC." Electronics 9, no. 1 (2020): 199. http://dx.doi.org/10.3390/electronics9010199.
Full textLu, Tzu-Chuen, Ping-Chung Yang, and Biswapati Jana. "Improving the Reversible LSB Matching Scheme Based on the Likelihood Re-Encoding Strategy." Entropy 23, no. 5 (2021): 577. http://dx.doi.org/10.3390/e23050577.
Full textMuatamed, Hajer, and Anbar Mohammed. "Identifying optimal message embedding location in audio steganography using generative adversarial networks." Eastern-European Journal of Enterprise Technologies 4, no. 9 (118) (2022): 59–68. https://doi.org/10.15587/1729-4061.2022.263695.
Full textArtiemjew, Piotr, and Aleksandra Kislak-Malinowska. "Indiscernibility Mask Key for Image Steganography." Computers 9, no. 2 (2020): 38. http://dx.doi.org/10.3390/computers9020038.
Full textDarwis, Dedi, Akmal Junaidi, Dewi Asiah Shofiana, and Wamiliana. "A New Digital Image Steganography Based on Center Embedded Pixel Positioning." Cybernetics and Information Technologies 21, no. 2 (2021): 89–104. http://dx.doi.org/10.2478/cait-2021-0021.
Full textJia, Hanbo, Xuan Guo, Xuqiang Zheng, et al. "A 4-bit 36 GS/s ADC with 18 GHz Analog Bandwidth in 40 nm CMOS Process." Electronics 9, no. 10 (2020): 1733. http://dx.doi.org/10.3390/electronics9101733.
Full textLara, Lara, Hadeel M. Saleh, Asraa Y. .., Lara Ahmad Ghasab Almashagba, and Fathiya Al Abri. "Biometric Data Securement Using Visual Information Encryption." Journal of Cybersecurity and Information Management 16, no. 1 (2025): 99–106. https://doi.org/10.54216/jcim.160108.
Full textAlia, Mohammad, and Khaled Suwais. "Improved Steganography Scheme based on Fractal Set." International Arab Journal of Information Technology 17, no. 1 (2019): 128–36. http://dx.doi.org/10.34028/iajit/17/1/15.
Full textMahmood, Ahlam Fadhil, Nada Abdul Kanai, and Sana Sami Mohmmad. "An FPGA Implementation of Secured Steganography Communication System." Tikrit Journal of Engineering Sciences 19, no. 4 (2012): 14–23. http://dx.doi.org/10.25130/tjes.19.4.02.
Full textLi, Longlong, Yuliang Lu, Lintao Liu, Yuyuan Sun, and Jiayu Wang. "Practical Secret Image Sharing Based on the Chinese Remainder Theorem." Mathematics 10, no. 12 (2022): 1959. http://dx.doi.org/10.3390/math10121959.
Full textKamal, A. H. M. "Steganography: Securing Message in wireless network." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 3 (2013): 797–801. http://dx.doi.org/10.24297/ijct.v4i3.4200.
Full textMajeed, Nehayat Ezzaldeen, and Haval Mohammed Sidqi. "Robust Steganography Technique for Embedding Secret Images." Halabja University Journal 7, no. 4 (2022): 264–81. http://dx.doi.org/10.32410/huj-10443.
Full textPriya, Jain, Kumar Somesh, and Kumar Goel Raj. "A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques." International Journal of Trend in Scientific Research and Development 2, no. 5 (2018): 20–24. https://doi.org/10.31142/ijtsrd15800.
Full textChen, Yuantao, Jiajun Tao, Qian Zhang, et al. "Saliency Detection via the Improved Hierarchical Principal Component Analysis Method." Wireless Communications and Mobile Computing 2020 (May 5, 2020): 1–12. http://dx.doi.org/10.1155/2020/8822777.
Full textChi, Sabrina S., and Devin M. Shanthikumar. "Local Bias in Google Search and the Market Response around Earnings Announcements." Accounting Review 92, no. 4 (2016): 115–43. http://dx.doi.org/10.2308/accr-51632.
Full textHajer, Muatamed, and Mohammed Anbar. "Identifying optimal message embedding location in audio steganography using generative adversarial networks." Eastern-European Journal of Enterprise Technologies 4, no. 9(118) (2022): 59–68. http://dx.doi.org/10.15587/1729-4061.2022.263695.
Full textГуц, А. К., and Д. Э. Вильховский. "An algorithm for identifying steganographic inserts of the LSB-replacement type based on the hierarchy analysis." МОДЕЛИРОВАНИЕ, ОПТИМИЗАЦИЯ И ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ 8, no. 2(29) (2020): 6–7. http://dx.doi.org/10.26102/2310-6018/2020.29.2.006.
Full textIzvolsky, A. A. "Matrix model parametric identification of antenna tuning units." Vestnik IzhGTU imeni M.T. Kalashnikova 26, no. 1 (2023): 71–83. http://dx.doi.org/10.22213/2413-1172-2023-1-71-83.
Full textAl-Obaidi, Fatin E. M., and Ali Jassim Mohamed Ali. "Which Bit Is Better in Least Significant Bit?" Journal of Information Security 06, no. 03 (2015): 161–65. http://dx.doi.org/10.4236/jis.2015.63017.
Full textPraveenkum, Padmapriya, P. Rajalakshm, G. U. Priyanga, K. Thenmozhi, John Bosco Balaguru Rayappan, and Rengarajan Amirtharaj. "Least Significant Bit but Quantum Bit: A Quasi Stego." Information Technology Journal 13, no. 16 (2014): 2544–51. http://dx.doi.org/10.3923/itj.2014.2544.2551.
Full textOlbrich, Rainer, and Carsten D. Schultz. "Multichannel advertising: does print advertising affect search engine advertising?" European Journal of Marketing 48, no. 9/10 (2014): 1731–56. http://dx.doi.org/10.1108/ejm-10-2012-0569.
Full textShreelekshmi, R., M. Wilscy, and C. E. Veni Madhavan. "Undetectable least significant bit replacement steganography." Multimedia Tools and Applications 78, no. 8 (2018): 10565–82. http://dx.doi.org/10.1007/s11042-018-6541-0.
Full textAditya, Sonar, Malve Ved, Kandekar Shashikant, Kardile Samadhan, and Ms Adke Shilpa. "Image Steganography Using Least Significant Bit." International Journal of Research Publication and Reviews 5, no. 4 (2024): 2505–8. http://dx.doi.org/10.55248/gengpi.5.0424.0966.
Full textLubis, R. R. A., S. M. Hardi, M. Zarlis, I. Jaya, and J. T. Tarigan. "Analysis on Combination of Watermarking Algorithm: Modified Least Significant Bit Algorithm with Least Significant Bit+1." Journal of Physics: Conference Series 1235 (June 2019): 012081. http://dx.doi.org/10.1088/1742-6596/1235/1/012081.
Full textAmin, M. Miftakul. "IMAGE STEGANOGRAPHY DENGAN METODE LEAST SIGNIFICANT BIT (LSB)." CSRID (Computer Science Research and Its Development Journal) 6, no. 1 (2015): 53. http://dx.doi.org/10.22303/csrid.6.1.2014.53-64.
Full textZhong, Hua. "New least-significant-bit-based steganographic model." Optical Engineering 42, no. 7 (2003): 2082. http://dx.doi.org/10.1117/1.1577351.
Full textDarmawan, Yudhi, Nico Fahrul Marinza, and Yohanes Dwi Cahyono. "OPTIMASI STEGANOGRAFI BERBASIS LEAST SIGNIFICANT BIT (LSB) METODE OPERASI PERGESERAN BIST." JATI (Jurnal Mahasiswa Teknik Informatika) 8, no. 5 (2024): 11055–59. http://dx.doi.org/10.36040/jati.v8i5.11825.
Full textKwan, Chiman, and David Gribben. "Target Detection and Classification Improvements using Contrast Enhanced 16-bit Infrared Videos." Signal & Image Processing : An International Journal 12, no. 1 (2021): 23–38. http://dx.doi.org/10.5121/sipij.2021.12103.
Full textWiranata, Ade Davy, and Rima Tamara Aldisa. "Aplikasi Steganografi Menggunakan Least Significant Bit (LSB) dengan Enkripsi Caesar Chipper dan Rivest Code 4 (RC4) Menggunakan Bahasa Pemrograman JAVA." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 5, no. 3 (2021): 277. http://dx.doi.org/10.35870/jtik.v5i3.219.
Full textNur’aini, Siti. "Steganografi Pada Digital Image Menggunakan Metode Least Significant Bit Insertion." Walisongo Journal of Information Technology 1, no. 1 (2019): 73. http://dx.doi.org/10.21580/wjit.2019.1.1.4025.
Full textPradita, Ranida, and Ida Nurhaida. "Implementasi Steganografi Video dengan Menggunakan Metode Egypt, Least Significant Bit (LSB) dan Least Significant Bit (LSB) Fibonacci Edge Pixel." Jurnal Telekomunikasi dan Komputer 10, no. 1 (2020): 25. http://dx.doi.org/10.22441/incomtech.v10i1.7282.
Full textWang, Jun Jie, Qian Mo, Dong Xia Mei, and Su Li. "Research for Robust Watermarking Algorithm Using Least Significant Bit." Advanced Materials Research 268-270 (July 2011): 1697–700. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1697.
Full textJulianto, Yohanes, and Kristoforus Jawa Bendi. "SISTEM STEGANOGRAFI DENGAN METODE LEAST SIGNIFICANT BIT (LSB) TERACAK." Jurnal Ilmiah Flash 2, no. 2 (2016): 116. http://dx.doi.org/10.32511/jiflash.v2i2.32.
Full text