2022
DOI: 10.1016/j.jksuci.2021.01.013
|View full text |Cite
|
Sign up to set email alerts
|

A novel matrix multiplication based LSB substitution mechanism for data security and authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
13
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(15 citation statements)
references
References 14 publications
2
13
0
Order By: Relevance
“…PSNR is mathematically based metrics which measures the intensity of the distortion between the original image and distorted image. The higher the PSNR, the more similar they are and the better the quality of the reproduce image (Rinki et al, 2021). The next metrics Normalized correlation coefficient (NCC) is used to evaluate the robustness of algorithm (Hurrah et al, 2019;Kishore, 2020).…”
Section: Simulation Results and Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…PSNR is mathematically based metrics which measures the intensity of the distortion between the original image and distorted image. The higher the PSNR, the more similar they are and the better the quality of the reproduce image (Rinki et al, 2021). The next metrics Normalized correlation coefficient (NCC) is used to evaluate the robustness of algorithm (Hurrah et al, 2019;Kishore, 2020).…”
Section: Simulation Results and Analysismentioning
confidence: 99%
“…Digital watermarking technique embeds a digital content with unique description (specific identification) signal known as watermark which can be extracted later for authentication purpose (Rinki et al, 2021;Sharma et al, 2019). The host digital content and watermark content can be any multimedia object.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Conventional data-hiding techniques, such as Least Significant Bit (LSB) substitution [14], LSB matching [15], and Pixel Value Differences (PVD), result in cover media distortion, which remains even after the hidden data are extracted. Though these irreversible data-hiding techniques provide improved data-embedding capabilities, they cannot be used in applications were extraction of both the secret data and the original image is the prime requirement.…”
Section: Related Literaturementioning
confidence: 99%
“…Joshi et al [21] presented a detailed study of LSB method using different secret message sizes to analyze its impact on the PSNR and MSE metrics. Rinki et al [22] proposed a new LSB digital watermarking scheme based on the selection of the non-consecutive matrix of pixels to replace the last three bits of each RGB components of the host image by the bits of the watermark image, the authors claimed that this scheme enhance robustness, imperceptibility, and security. Sowmya et al [23] proposed an algorithm based on the embedding of a watermark into another watermark in addition to encrypting the main watermark using A5/1 encryption algorithm, then the encrypted watermark is inserted into the two LSBs of the host image green and blue components.…”
Section: Introductionmentioning
confidence: 99%