Proceedings of the 2019 4th International Conference on Big Data and Computing - ICBDC 2019 2019
DOI: 10.1145/3335484.3335514
|View full text |Cite
|
Sign up to set email alerts
|

A Modified Hash Based Least Significant Bits Algorithm for Steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…The quality of the steganography method employed will be higher if, in accordance with the principle of good steganography, the embedded message becomes less evident in the carrier media or if there are minimal or nonexistent changes in pixel values [33], [34].…”
Section: ) Message Insertion Algoritmmentioning
confidence: 99%
“…The quality of the steganography method employed will be higher if, in accordance with the principle of good steganography, the embedded message becomes less evident in the carrier media or if there are minimal or nonexistent changes in pixel values [33], [34].…”
Section: ) Message Insertion Algoritmmentioning
confidence: 99%
“…Muyco and team [21] executed encryption and decryption operations on images using a refined hashing technique, and subsequently applied an improved version of the LSB method to obtain enhanced steganography outcomes. Shwe Sin and colleagues [28] introduced a steganography approach that integrates the Least Significant Bit (LSB) technique with Huffman coding.…”
Section: Steganographymentioning
confidence: 99%
“…to advance a video steganography mechanism [17] uses 2D chaotic map and NLFSR, where the separated frames will contain embedded data. ISSN: 2710-2165 http://doi.org/10.33193/IJSER.2.1.2022.53 https://ijser.aliraqia.edu.iq By means of the hash value in image, the study in [18] targets to demonstrate a hash based LSB method where results are secured by using EXIF data through employing cryptography and steganography. [19] proposes a combination of the Rivest Code 4 (RC4), Least Significant Bit (LSB)-Blowfish because it can offer layered security on confidential data.…”
Section: Literature Reviewmentioning
confidence: 99%