Journal articles on the topic 'Selected least signified bit'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Selected least signified bit.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Aljidi, Bashar Izzeddin Issa, Sundresan Perumal, and Sakinah Ali Pitchay. "Securing data using deep hiding selected least significant bit and adaptive swarm algorithm." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 3 (2022): 1573–81. https://doi.org/10.11591/ijeecs.v28.i3.pp1573-1581.
Full textAljidi, Bashar Izzeddin Issa, Sundresan Perumal, and Sakinah Ali Pitchay. "Securing data using deep hiding selected least significant bit and adaptive swarm algorithm." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 3 (2022): 1573. http://dx.doi.org/10.11591/ijeecs.v28.i3.pp1573-1581.
Full textSwain, Gandharba, and Saroj Kumar Lenka. "A Dynamic Approach to Image Steganography Using the Three Least Significant Bits and Extended Hill Cipher." Advanced Materials Research 403-408 (November 2011): 842–49. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.842.
Full textLiu, Yong, and Dawen Xu. "HEVC Information-Hiding Algorithm Based on Intra-Prediction and Matrix Coding." International Journal of Digital Crime and Forensics 13, no. 6 (2021): 1–15. http://dx.doi.org/10.4018/ijdcf.20211101.oa11.
Full textSharma, Rajesh R., A. Bagubali, and K. Sasikumar. "Bit Error Rate Analysis of Physical Layer Network Coding Spatially Modulated Full-Duplex Nodes Based Bidirectional Wireless Relay Network." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 9 (2022): 07–14. http://dx.doi.org/10.17762/ijritcc.v10i9.5640.
Full textAbdulhamid, Mohanad, and Mwaniki Muchai. "Performance of Multiple Rank Modulation Based on SM-MIMO." Land Forces Academy Review 24, no. 1 (2019): 61–67. http://dx.doi.org/10.2478/raft-2019-0007.
Full textAlshammari, Kaznah. "Exposing the most match parity bit approach (MMPB-A) for data concealment in digital images." International Journal of ADVANCED AND APPLIED SCIENCES 11, no. 8 (2024): 57–65. http://dx.doi.org/10.21833/ijaas.2024.08.007.
Full textJin, Xuesong, Huiyuan Sun, and Yuhang Zhang. "Research on VVC Intra-Frame Bit Allocation Scheme Based on Significance Detection." Applied Sciences 14, no. 1 (2024): 471. http://dx.doi.org/10.3390/app14010471.
Full textAdhimah, Laily Farkhah, Isti Nurhafiyah, Adnan Aditya Muntahar, Fandi Kristiaji, and Dinar Mustofa. "Implementasi Aplikasi Steganografi Berbasis Web Menggunakan Algoritma LSB dan BPCS." Komputa : Jurnal Ilmiah Komputer dan Informatika 12, no. 2 (2023): 100–108. http://dx.doi.org/10.34010/komputa.v12i2.10319.
Full textSwain, Gandharba, and Saroj Kumar Lenka. "A Robust Image Steganography Technique Using Dynamic Embedding with Two Least Significant Bits." Advanced Materials Research 403-408 (November 2011): 835–41. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.835.
Full textLagun, A., and O. Polotai. "FEATURES OF HIDING INFORMATION IN IMAGES WITH USING THE LEAST SIGNIFICANT BIT." Bulletin of Lviv State University of Life Safety 20 (January 23, 2020): 17–22. http://dx.doi.org/10.32447/20784643.20.2019.03.
Full textSadiq, B. J. S., V. Yu Tsviatkou та М. N. Bobov. "Аdaptive combined image coding with prediction of arithmetic code volume". Doklady BGUIR 19, № 2 (2021): 31–39. http://dx.doi.org/10.35596/1729-7648-2021-19-2-31-39.
Full textCaballero, Hector, Vianney Muñoz, and Marco A. Ramos-Corchado. "A comparative study of steganography using watermarking and modifications pixels versus least significant bit." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 6 (2023): 6335. http://dx.doi.org/10.11591/ijece.v13i6.pp6335-6350.
Full textHector, Caballero, Muñoz Vianney, and A. Ramos-Corchado Marco. "A comparative study of steganography using watermarking and modifications pixels versus least significant bit." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 6 (2023): 6335–50. https://doi.org/10.11591/ijece.v13i6.pp6335-6350.
Full textNearchou, Andreas C. "Path planning of a mobile robot using genetic heuristics." Robotica 16, no. 5 (1998): 575–88. http://dx.doi.org/10.1017/s0263574798000289.
Full textAgbozo, Faith, Doris Ocansey, Prosper Atitto, and Albrecht Jahn. "Compliance of a Baby-Friendly Designated Hospital in Ghana With the WHO/UNICEF Baby and Mother-Friendly Care Practices." Journal of Human Lactation 36, no. 1 (2019): 175–86. http://dx.doi.org/10.1177/0890334419848728.
Full textBanham, Gary. "PrefaceThe ‘Deconstruction of Christianity’: A Special Issue." Derrida Today 6, no. 1 (2013): 1–10. http://dx.doi.org/10.3366/drt.2013.0048.
Full textArtiemjew, Piotr, and Aleksandra Kislak-Malinowska. "Indiscernibility Mask Key for Image Steganography." Computers 9, no. 2 (2020): 38. http://dx.doi.org/10.3390/computers9020038.
Full textHalboos, Estabraq Hussein Jasim, and Abbas M. Albakry. "Hiding text using the least significant bit technique to improve cover image in the steganography system." Bulletin of Electrical Engineering and Informatics 11, no. 6 (2022): 3258–71. http://dx.doi.org/10.11591/eei.v11i6.4337.
Full textEstabraq, Hussein Jasim Halboos, and M. Albakry Abbas. "Hiding text using the least significant bit technique to improve cover image in the steganography system." Bulletin of Electrical Engineering and Informatics 11, no. 6 (2022): 3258~3271. https://doi.org/10.11591/eei.v11i6.4337.
Full textDevlin, Maurice. "A Bit of the ‘Other’: Media Representations of Young People's Sexuality." Irish Journal of Sociology 12, no. 2 (2003): 86–106. http://dx.doi.org/10.1177/079160350301200206.
Full textKim, Cheonshik, Luis Cavazos Quero, Ki-Hyun Jung, and Lu Leng. "Advanced Dual Reversible Data Hiding: A Focus on Modification Direction and Enhanced Least Significant Bit (LSB) Approaches." Applied Sciences 14, no. 6 (2024): 2437. http://dx.doi.org/10.3390/app14062437.
Full textBedelean, Bogdan, Mihai Ispas, and Sergiu Răcășan. "Combining Artificial Neural Network and Response Surface Methodology to Optimize the Drilling Operating Parameters of MDF Panels." Forests 14, no. 11 (2023): 2254. http://dx.doi.org/10.3390/f14112254.
Full textGuan, Qing Yang, Xuan Li, and Xiao Yu Lan. "An Improved Frequency Offset Cancellation for Uplink Multi-User OFDMA System Based on TF-RLS Algorithm." Applied Mechanics and Materials 577 (July 2014): 1004–7. http://dx.doi.org/10.4028/www.scientific.net/amm.577.1004.
Full textHossain, Mohammad Makbul, Sabarin Ahamed, Khalifa Mahmud Tarik, Md Yousuf Hira, and Partha Shekhar Roy. "The Effect of Analgesia in Fast Track Pediatric Cardiac Patient." Scholars Journal of Applied Medical Sciences 10, no. 12 (2022): 2455–59. http://dx.doi.org/10.36347/sjams.2022.v10i12.064.
Full textZalata, Mohamad K. Abu, Mohamad T. Barakat, and Ziad A. Alqadi. "Carrier Image Rearrangement to Enhance the Security Level of LSB Method of Data Steganography." International Journal of Computer Science and Mobile Computing 11, no. 1 (2022): 182–93. http://dx.doi.org/10.47760/ijcsmc.2022.v11i01.024.
Full textPraminatih, Gusti Ayu. "A DIACHRONIC STUDY OF THE AUTHORIAL IDENTITY IN TOURISM RESEARCH ARTICLES." MOZAIK HUMANIORA 20, no. 2 (2021): 145. http://dx.doi.org/10.20473/mozaik.v20i2.18935.
Full textkhaled, Mayar, and Ahmed H. Abu El-Atta. "Developing Algorithms for Image Steganography and Increasing the Capacity Depending on Choosing the Best Pixels." International journal of Computer Networks & Communications 14, no. 4 (2022): 99–115. http://dx.doi.org/10.5121/ijcnc.2022.14406.
Full textYi, Donghee, Heetae Jin, Moon Chan Kim, and Suk Chan Kim. "An Ultrasonic Object Detection Applying the ID Based on Spread Spectrum Technique for a Vehicle." Sensors 20, no. 2 (2020): 414. http://dx.doi.org/10.3390/s20020414.
Full textOwenga, John Timon Odhiambo, Peter J. O. Aloka, and Pamela A. Raburu. "Relationship between Selected Personal Determinants and Examination Cheating among Kenyan Secondary School Students." Academic Journal of Interdisciplinary Studies 7, no. 1 (2018): 73–82. http://dx.doi.org/10.2478/ajis-2018-0007.
Full textKhan, Shoab. "Multi-Image Steganography." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem32607.
Full textBarakat, Mohamad Tariq, Rushdi Abu Zneit, and Ziad A. Alqadi. "Crypto-Steganographic Method to Protect Secret Messages." International Journal of Computer Science and Mobile Computing 10, no. 12 (2021): 46–61. http://dx.doi.org/10.47760/ijcsmc.2021.v10i12.007.
Full textGupta, Aparna, Vijay Sharma, and Lalit Singh. "Process variable studies for preparation of optimized system for bupropion hydrochloride using CCD." Journal of Drug Delivery and Therapeutics 9, no. 2-s (2019): 281–90. http://dx.doi.org/10.22270/jddt.v9i2-s.2513.
Full textAlqobaty, Dr/Abdulmalek. "A Robust Audio Steganography Method Using Partial Knight Tour for Concealing Messages of Text and Image." مجلة جامعة السعيد للعلوم الانسانية و التطبيقية 3, no. 2 (2023): 10. http://dx.doi.org/10.59325/sjhas.v3i2.67.
Full textBalli, Keerthana, and Dr Ch D. V. Subba Rao. "Secure Video Steganography using ChaCha20 Encryption and Adaptive LSB." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 1961–68. https://doi.org/10.22214/ijraset.2025.68656.
Full textAlobaidi, Taif, and Wasfy Mikhael. "An Adaptive Steganography Insertion Technique Based on Cosine Transform." Iraqi Journal for Electrical and Electronic Engineering 20, no. 2 (2024): 45–58. http://dx.doi.org/10.37917/ijeee.20.2.4.
Full textRushton, Laura, Andrea Sass, Adam Baldwin, Christopher G. Dowson, Denise Donoghue, and Eshwar Mahenthiralingam. "Key Role for Efflux in the Preservative Susceptibility and Adaptive Resistance of Burkholderia cepacia Complex Bacteria." Antimicrobial Agents and Chemotherapy 57, no. 7 (2013): 2972–80. http://dx.doi.org/10.1128/aac.00140-13.
Full textFeshki, Fatemeh, Abdolali Banaeifar, and Mehdi Kasbparast. "The Effects of a 6-Week Selected Balance and Cawthorne-Cooksey Exercises on Static Balance and Mobility in Female Patients With Multiple Sclerosis." Physical Treatments - Specific Physical Therapy 10, no. 3 (2020): 169–76. http://dx.doi.org/10.32598/ptj.10.3.449.1.
Full textRoy, Sodip. "Student Cabinet and Curricular Activities: A Case Study of a Secondary School in Bangladesh." Journal of Education and Research 10, no. 2 (2020): 7–26. http://dx.doi.org/10.3126/jer.v10i2.32718.
Full textHebbache, Khaled, Belal Khaldi, Oussama Aiadi, and Ali Benziane. "A DWT-Based Approach with Gradient Analysis for Robust and Blind Medical Image Watermarking." Applied Sciences 14, no. 14 (2024): 6199. http://dx.doi.org/10.3390/app14146199.
Full textJiménez Rodríguez, Maricela, Carlos Eduardo Padilla Leyferman, Juan Carlos Estrada Gutiérrez, María Guadalupe González Novoa, Horacio Gómez Rodríguez, and Octavio Flores Siordia. "Steganography applied in the origin claim of pictures captured by drones based on chaos." Ingeniería e Investigación 38, no. 2 (2018): 61–69. http://dx.doi.org/10.15446/ing.investig.v38n2.64509.
Full textPapadakis, Nikolaos M., Ioanna Aroni, and Georgios E. Stavroulakis. "Effectiveness of MP3 Coding Depends on the Music Genre: Evaluation Using Semantic Differential Scales." Acoustics 4, no. 3 (2022): 704–19. http://dx.doi.org/10.3390/acoustics4030042.
Full textGulášová, Michala, and Matúš Jókay. "Steganalysis of Stegostorage Library." Tatra Mountains Mathematical Publications 67, no. 1 (2016): 99–116. http://dx.doi.org/10.1515/tmmp-2016-0034.
Full textTudorache, Alexandru-Gabriel, Vasile Manta, and Simona Caraiman. "Integration of a Quantum Voting Scheme into Grayscale Images Using the Novel Enhanced Quantum Representation and Qiskit Framework." Modelling and Simulation in Engineering 2022 (April 19, 2022): 1–11. http://dx.doi.org/10.1155/2022/8128754.
Full textA. Jassim, H., Z. K. Taha, M. A. Alsaedi, and B. M. Albaker. "Enhancing data transfer architecture using LSB steganography combined with reed solomon code." International Journal of Engineering & Technology 7, no. 2.29 (2018): 24. http://dx.doi.org/10.14419/ijet.v7i2.29.13119.
Full textSharif, Md Jamil, and Shawrin Ahmed Khan. "Determinants of Effective Tax Rate: Empirical Evidence From Selected Manufacturing Industries in Bangladesh." Accounting Analysis Journal 12, no. 3 (2024): 177–89. http://dx.doi.org/10.15294/aaj.v12i3.70826.
Full textJaikishun, Sirpaul, Shikui Song, and Zhenbiao Yang. "Screening for Salt Tolerance in Chenopodium quinoa Genotype Seedlings through Germination in a Hydroponic System." Journal of Applied Life Sciences International 26, no. 6 (2023): 75–87. http://dx.doi.org/10.9734/jalsi/2023/v26i6629.
Full textMéndez-Naranjo, Pablo, and Andrés Cisneros-Barahona. "Evaluación de la propuesta algorítmica criptográfica con la incorporación de la esteganografía en imágenes. // Evaluation of the cryptographic algorithmic proposal with the incorporation of steganography into images." Ciencia Unemi 10, no. 25 (2018): 134. http://dx.doi.org/10.29076/issn.2528-7737vol10iss25.2017pp134-147p.
Full textDiem, Chuzaimah D., Nova T. Yuniarti, and Soni Mirizon. "What Could the Big6 Strategy Do to Students’ English and Information Literacies?" Studies in Linguistics and Literature 3, no. 1 (2019): 30. http://dx.doi.org/10.22158/sll.v3n1p30.
Full textGui, Guan, Zhang-xin Chen, Li Xu, Qun Wan, Jiyan Huang, and Fumiyuki Adachi. "Variable Is Better Than Invariable: Sparse VSS-NLMS Algorithms with Application to Adaptive MIMO Channel Estimation." Scientific World Journal 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/274897.
Full text