Journal articles on the topic 'LSB and DCT'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'LSB and DCT.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yunus, Mahmuddin, and Agus Harjoko. "Penyembunyian Data pada File Video Menggunakan Metode LSB dan DCT." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 8, no. 1 (2014): 81. http://dx.doi.org/10.22146/ijccs.3498.
Full textNkuna, M.C., E. Esenogho, and R. Heymann. "Using Artificial Neural Network to Analyze Stego Images." Nigerian Research Journal of Engineering and Environmental Sciences 6, no. 2 (2021): 476–82. https://doi.org/10.5281/zenodo.5805077.
Full textSavale, Vaishali, and Tarunendra Bhadauria. "Different Techniques of Steganography in Images." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–7. http://dx.doi.org/10.55041/ijsrem39153.
Full textSingla, Tamanna, and Ashwani Sethi. "Steganography: A Juxtaposition between LSB DCT, DWT." International Journal of Computer Applications 126, no. 11 (2015): 6–10. http://dx.doi.org/10.5120/ijca2015906215.
Full textKaur, Randeep, and Kamaljit Kaur Dhillon. "GRAYSCALE IMAGE WATERMARK DETECTION." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (2012): 100–105. http://dx.doi.org/10.24297/ijct.v3i1b.2748.
Full text., Priya Porwal. "DIGITAL VIDEO WATERMARKING USING MODIFIED LSB AND DCT TECHNIQUE." International Journal of Research in Engineering and Technology 03, no. 04 (2014): 630–34. http://dx.doi.org/10.15623/ijret.2014.0304112.
Full textKukuh Yulion Setia Prakoso, Yulison Herry Chrisnanto, and Fatan Kasyidi. "STEGANOGRAFI METODE INVERTED LSB MENGGUNAKAN POLA ADAPTIF DAN DCT." Jurnal Informatika dan Rekayasa Elektronik 7, no. 2 (2024): 218–30. https://doi.org/10.36595/jire.v7i2.1222.
Full textS. N., Prajwalasimha, Chethan Suputhra .S, and Mohan C. S. "Performance analysis of DCT and successive division based digital image watermarking scheme." Indonesian Journal of Electrical Engineering and Computer Science 15, no. 2 (2019): 750. http://dx.doi.org/10.11591/ijeecs.v15.i2.pp750-757.
Full textOsama, F. AbdelWahab, I. Hussein Aziza, F. A. Hamed Hesham, M. Kelash Hamdy, A.M. Khalaf Ashraf, and M. Ali Hanafy. "Hiding data in images using steganography techniques with compression algorithms." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 3 (2019): 1168–75. https://doi.org/10.12928/TELKOMNIKA.v17i3.12230.
Full textAlobaidi, Taif, and Wasfy Mikhael. "An Adaptive Steganography Insertion Technique Based on Cosine Transform." Iraqi Journal for Electrical and Electronic Engineering 20, no. 2 (2024): 45–58. http://dx.doi.org/10.37917/ijeee.20.2.4.
Full textJókay, Matúš, and Tomáš Moravćík. "Image-based jpeg steganography." Tatra Mountains Mathematical Publications 45, no. 1 (2010): 65–74. http://dx.doi.org/10.2478/v10127-010-0006-9.
Full textMohammed Hassan Abd and Osamah Waleed Allawi. "Secured Mechanism Towards Integrity of Digital Images Using DWT, DCT, LSB and Watermarking Integrations." Ibn AL-Haitham Journal For Pure and Applied Sciences 36, no. 2 (2023): 454–68. http://dx.doi.org/10.30526/36.2.3088.
Full textPurba, Ronsen, Arwin Halim, Apin Ridwan, and Rudy Rudy. "Fragile Image Watermarking Berbasis DCT dengan Operator Evolusi Hybrid of Particle Swarm Optimization." Jurnal SIFO Mikroskil 15, no. 1 (2014): 11–20. http://dx.doi.org/10.55601/jsm.v15i1.145.
Full textAmit, Kumar, and Niwaria Kamal. "DWT and LSB based Audio Steganography- A Review." International Journal of Engineering and Management Research 8, no. 1 (2018): 82–84. https://doi.org/10.5281/zenodo.3362756.
Full textGulášová, Michala, and Matúš Jókay. "Steganalysis of Stegostorage Library." Tatra Mountains Mathematical Publications 67, no. 1 (2016): 99–116. http://dx.doi.org/10.1515/tmmp-2016-0034.
Full textDeng, Hua, Chun Hua Zhang, Hai Zhu Yu, and Jj Fu Zhang. "Design Method of H.264/AVC Video Watermarking Based on Intra Prediction Coding." Applied Mechanics and Materials 644-650 (September 2014): 4257–60. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.4257.
Full textMr., Mandar Digambar Khatavkar, and A. S. Mali Prof. "A REVIEW OF IMAGE SECURITY WITH STEGANOGRAPHY USING DCT COEFFICIENT AND ENCRYPTION." JournalNX - A Multidisciplinary Peer Reviewed Journal 2, no. 6 (2016): 26–30. https://doi.org/10.5281/zenodo.1469535.
Full textAmit, Kumar, and Niwaria Kamal. "Result Analysis of DWT and LSB based Audio Steganography." International Journal of Engineering and Management Research 8, no. 1 (2018): 79–81. https://doi.org/10.5281/zenodo.3362750.
Full textThakre, Nitin, Sakshi Junghare, Pranali Sakhre, and Dipti Khawse. "Steganography a Technique to Hide Information within an Image." Journal of Cyber Security, Privacy Issues and Challenges 2, no. 1 (2023): 14–19. http://dx.doi.org/10.46610/jcspic.2023.v02i01.003.
Full textBobade, Miss Gayatri Ganesh. "Effect of Secret Image Transformation on the Steganography Process by using LSB & DCT Techniques." International Journal for Research in Applied Science and Engineering Technology 7, no. 7 (2019): 468–74. http://dx.doi.org/10.22214/ijraset.2019.7071.
Full textAlshammari, Kaznah. "Exposing the most match parity bit approach (MMPB-A) for data concealment in digital images." International Journal of ADVANCED AND APPLIED SCIENCES 11, no. 8 (2024): 57–65. http://dx.doi.org/10.21833/ijaas.2024.08.007.
Full textRadhe, Shyam Panda, Gupta Deepika, Jaiswal Madhuri, Kasar Vaishnavi, and A. L. Prasanna. "Image steganography approach using spatial and transform domain technique." i-manager's Journal on Computer Science 10, no. 1 (2022): 21. http://dx.doi.org/10.26634/jcom.10.1.18504.
Full textChaitanya, Gogineni Krishna, Sasidhar Reddy Gaddam, Khadri Syed Faizz Ahmad, Balaji Vicharapu, Uppuluri Lakshmi Soundharya, and Uppuluri Naga Lakshmi Madhuri. "A Multimodal Approach to Digital Security: Combining Steganography, Watermarking, and Image Enhancement." International Journal of Basic and Applied Sciences 14, no. 2 (2025): 611–19. https://doi.org/10.14419/3r5r6r74.
Full textFadhil Mohammed, Amal, Hayder A. Nahi, Akmam Majed Mosa, and Inas Kadhim. "Secure E-healthcare System Based on Biometric Approach." Data & Metadata 2 (July 8, 2023): 56. http://dx.doi.org/10.56294/dm202356.
Full textWaqas, Ghulam Jilani, Ishtiaq Ahmad, Muhammad Kashif Samee, Muhammad Nasir Khan, and Ali Raza. "A hybrid OFDM–CDMA-based robust image watermarking technique." International Journal of Wavelets, Multiresolution and Information Processing 18, no. 06 (2020): 2050043. http://dx.doi.org/10.1142/s0219691320500435.
Full textV., Ashok Kumar, Dharmaraj C., and Srinivasa Rao Ch. "A Hybrid Digital Watermarking Approach Using Wavelets and LSB." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 5 (2017): 2483–95. https://doi.org/10.11591/ijece.v7i5.pp2483-2495.
Full textRatnasari, Anita Putri, and Felix Andika Dwiyanto. "Metode Steganografi Citra Digital." Sains, Aplikasi, Komputasi dan Teknologi Informasi 2, no. 2 (2020): 52. http://dx.doi.org/10.30872/jsakti.v2i2.3300.
Full textKhalifa, Farhad M., and Mohammed G. Saeed. "Image Watermarking Using All Phase Discrete Cosine Biorthogonal Transform in Selected Pixel Blocks." Polytechnic Journal 10, no. 1 (2020): 68–73. http://dx.doi.org/10.25156/ptj.v10n1y2020.pp68-73.
Full textOuyang, Chun-Juan, Chang-Xin Liu, Ming Leng, and Huan Liu. "An OMP Steganographic Algorithm Optimized by SFLA." International Journal of Pattern Recognition and Artificial Intelligence 31, no. 01 (2017): 1754001. http://dx.doi.org/10.1142/s0218001417540015.
Full textAmeen, Siddeeq Y., and Muthana R. Al-Badrany. "Optimal Image Steganography Content Destruction Techniques." International Journal of Computers and Communications 15 (November 25, 2021): 84–88. http://dx.doi.org/10.46300/91013.2021.15.14.
Full textUmanskiy, O. G. "Review of Steganographic Methods and their Application in Securing Banking Information Systems." Èlektronnoe modelirovanie 46, no. 4 (2024): 87–111. http://dx.doi.org/10.15407/emodel.46.04.087.
Full textLei, Yue Rong, Xu Zhan, Ling Yan Du, Hui Ming Zeng, and Jian Ling Chen. "A Color Image Authentication System." Applied Mechanics and Materials 380-384 (August 2013): 2925–29. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2925.
Full textVibha, Gupta* Ekta Dixit. "A REVIEW ON VARIOUS TECHNIQUES FOR DIGITAL IMAGE WATERMARKING." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 5 (2017): 476–80. https://doi.org/10.5281/zenodo.573516.
Full textNie, Soo Ann, Ghazali Sulong, Rozniza Ali, and Andrew Abel. "The use of Least Significant Bit (LSB) and Knight Tour Algorithm for image steganography of cover image." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (2019): 5218. http://dx.doi.org/10.11591/ijece.v9i6.pp5218-5226.
Full textMejia Cabrera, Ivan, and Fernando Sialer Ayala. "COMPARACIÓN DE TÉCNICAS ESTEGANOGRÁFICAS DE DOMINIO ESPACIAL Y DOMINIO FRECUENCIAL EN IMÁGENES DIGITALES." INGENIERÍA: Ciencia, Tecnología e Innovación 2, no. 2 (2015): 41. http://dx.doi.org/10.26495/icti.v2i2.257.
Full textSoo, Ann Nie, Sulong Ghazali, Ali Rozniza, and Abel Andrew. "The use of least significant bit (LSB) and knight tour algorithm for image steganography of cover image." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (2019): 5218–26. https://doi.org/10.11591/ijece.v9i6.pp5218-5226.
Full textZhang, Yu Jie, and Yuan Yuan Zhang. "Design and Implementation of Video Copyright Protection System Based on LabVIEW and Water Transfer Printing Materials." Advanced Materials Research 460 (February 2012): 206–9. http://dx.doi.org/10.4028/www.scientific.net/amr.460.206.
Full textCruz, Clara, Rogelio Reyes, Mariko Nakano, and Héctor Pérez. "Semi-fragile watermarking based content image authentication scheme." Revista Facultad de Ingeniería Universidad de Antioquia, no. 56 (February 28, 2013): 160–69. http://dx.doi.org/10.17533/udea.redin.14664.
Full textSingh, Ranjeet Kumar, and Dilip Kumar Shaw. "A Hybrid Concept of Cryptography and Dual Watermarking (LSB_DCT) for Data Security." International Journal of Information Security and Privacy 12, no. 1 (2018): 1–12. http://dx.doi.org/10.4018/ijisp.2018010101.
Full textYang, Wei, Caijun Zhang, Jinqiu Zhang, Kaiqiang Xian, Qianjun Wu, and Xiaolong Wang. "A Two-domain Data Hiding Scheme for Data Signature in Integrated Online Services Applications." Journal of Physics: Conference Series 2137, no. 1 (2021): 012055. http://dx.doi.org/10.1088/1742-6596/2137/1/012055.
Full textJasim Halboos, Estabraq Hussein, and Abbas M. Albakry. "Improve steganography system using agents software based on statistical and classification technique." Bulletin of Electrical Engineering and Informatics 12, no. 3 (2023): 1595–606. http://dx.doi.org/10.11591/eei.v12i3.4540.
Full textAsoke Nath, Sankar Das, Rahul Sharma, Subhajit Mandal, and Hardick Sadhu. "Digital Steganography : A Comprehensive Study on Various Methods for Hiding Secret Data in a Cover file." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 3 (2024): 291–300. http://dx.doi.org/10.32628/cseit24103107.
Full textEstabraq, Hussein Jasim Halboos, and M. Albakry Abbas. "Improve steganography system using agents software based on statistical and classification technique." Bulletin of Electrical Engineering and Informatics 12, no. 3 (2023): 1595–606. https://doi.org/10.11591/eei.v12i3.4540.
Full textBarhate, B. H., and R. J. Ramteke. "Comparative Analysis and Measuring Qualitative Factors using Colour and Gray Scale Images for LSB and DCT- Mid Band Coefficient Digital Watermarking." International Journal of Computer Applications 128, no. 12 (2015): 34–38. http://dx.doi.org/10.5120/ijca2015906684.
Full textHammad, Omar Mejbel, Ikram Smaoui, Ahmed Fakhfakh, and Mohammed Mahdi Hashim. "An Overview of Image Steganography Techniques: Historical Development, Methodologies, and Evaluation Criteria." SHIFRA 2024 (June 3, 2024): 74–87. http://dx.doi.org/10.70470/shifra/2024/009.
Full textGwala, Dharmendra, and Vivek Shrivastava. "Secure Images for Copyright by Watermarking in Transform sphere using bidirectional Neural Network." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 04 (2013): 97–102. https://doi.org/10.5281/zenodo.14594677.
Full textChen, Z. F., J. J. Shuai, F. J. Tian, W. Y. Li, S. H. Zang, and X. Z. Zhang. "An Improved Privacy Protection Algorithm for Multimodal Data Fusion." Scientific Programming 2022 (August 23, 2022): 1–7. http://dx.doi.org/10.1155/2022/4189148.
Full textAnkush, R. Patil* V. K. Patil. "A REVIEW OF IMAGE WATERMARKING METHODS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 7 (2016): 127–33. https://doi.org/10.5281/zenodo.56916.
Full textN. Riharika and Dr K. Santhi Sree. "Innovative Approaches in Modern Steganography for Strengthening Data Security." International Journal of All Research Education and Scientific Methods 13, no. 05 (2025): 3390–97. https://doi.org/10.56025/ijaresm.2025.1305253390.
Full textS, Skandha Deepsita, Dhayala Kumar M, and Noor Mahammad SK. "Energy Efficient Error Resilient Multiplier Using Low-power Compressors." ACM Transactions on Design Automation of Electronic Systems 27, no. 3 (2022): 1–26. http://dx.doi.org/10.1145/3488837.
Full text