2020
DOI: 10.32604/cmc.2020.09186
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Approach of Image Steganography for Secure Communication Based on LSB Substitution Technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 28 publications
0
7
0
Order By: Relevance
“…LSB methods typically achieve high capacity [19] [10]. It is easy to implement, fast, and has better imperceptibility [20] [21]. However, LSB-based hiding schemes have certain limitations, such as visible degradation of the stego image (higher variability) when embedding large data, which affects the quality of stego images that are easily vulnerable to attacks [21] [22].…”
Section: A Substitution Least Significant Bit (K-lsb)mentioning
confidence: 99%
“…LSB methods typically achieve high capacity [19] [10]. It is easy to implement, fast, and has better imperceptibility [20] [21]. However, LSB-based hiding schemes have certain limitations, such as visible degradation of the stego image (higher variability) when embedding large data, which affects the quality of stego images that are easily vulnerable to attacks [21] [22].…”
Section: A Substitution Least Significant Bit (K-lsb)mentioning
confidence: 99%
“…K denotes the internal parameter matrix of the smatphone's camera. We can get Equation (7) from Equations ( 5) and ( 6):…”
Section: Sensor-based Enhanced Frame Correctionmentioning
confidence: 99%
“…To achieve eye‐friendliness and higher throughput for ad hoc device‐to‐device communication, dynamic and invisible screen‐camera communication is exploited by existing works 1‐8 . Yuan et al 1 proposed a real‐time photographic message extraction for visual MIMO optical system.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Its main goal is to hide secret data inside an inconspicuous medium that plays the role of cover. Steganographic techniques use various media, such as images [ 6 ], for which, new improvements are proposed [ 7 ]. Such algorithms in IoT should consider not only undetectability, but also efficiency.…”
Section: Introductionmentioning
confidence: 99%