2015 International Conference on Emerging Technologies (ICET) 2015
DOI: 10.1109/icet.2015.7389227
|View full text |Cite
|
Sign up to set email alerts
|

A secure true edge based 4 least significant bits steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
1
1

Relationship

4
5

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…This section compares the proposed data hiding technique with state-of-the-art data hiding methods. The comparison is made based on hiding capacity HC, peak signal to noise ratio PSNR, and structure similarity index SSI M. The proposed technique is compared with well-know data hiding techniques of Honsinger et al [9], Macq and Dewey [50], Fridrich et al [8], Lin and Li [51], Jaiswal et al [52], Goljan et al [53], Vleeschouwer et al [54], Khan et al [55], Alam et al [56], Wang et al [57], Khan and Tiziano [20], Khamrui and Mandal [58], Chang et al [28], Lee and Chen [59], Lin and Shiu [29], Koikara and Goswami [60], Hou et al [61], Wang et al [62], and Huang et al [63]. The comparison is made using three different cover images (Lena, Mandrill, and Pepper).…”
Section: Comparisonmentioning
confidence: 99%
“…This section compares the proposed data hiding technique with state-of-the-art data hiding methods. The comparison is made based on hiding capacity HC, peak signal to noise ratio PSNR, and structure similarity index SSI M. The proposed technique is compared with well-know data hiding techniques of Honsinger et al [9], Macq and Dewey [50], Fridrich et al [8], Lin and Li [51], Jaiswal et al [52], Goljan et al [53], Vleeschouwer et al [54], Khan et al [55], Alam et al [56], Wang et al [57], Khan and Tiziano [20], Khamrui and Mandal [58], Chang et al [28], Lee and Chen [59], Lin and Shiu [29], Koikara and Goswami [60], Hou et al [61], Wang et al [62], and Huang et al [63]. The comparison is made using three different cover images (Lena, Mandrill, and Pepper).…”
Section: Comparisonmentioning
confidence: 99%
“…The proposed technique is compared with well-known data hiding techniques of Honsinger et al [4], Macq and Dewey [35], Fridrich et al [3], Lin and Li [36], Jaiswal et al [37], Goljan et al [38], Vleeschouwer et al [39], Khan et al [16] and Khan and Tiziano [30]. The same cover images of Lena and Mandrill are used for experiments to make a comprehensive comparison.…”
Section: Comparisonmentioning
confidence: 99%
“…The hidden information creates no noticeable variation [14] and does not attract the human visual system (HVS) [15]. The HVS has some limitations, as reported in the literature [16]. The HVS is more sensitive to changes introduced in the smooth region of the cover image relative to the complex region.…”
Section: Introductionmentioning
confidence: 99%
“…It has become very challenging to detect the image modifications, which cannot be detected by naked eye. There are various powerful and extremely sophisticated software tools that can modify a digital image, not to attract the human visual system (HVS) (Khan et al, 2016;Khan et al, 2015). The modification can be of different types, e.g., pixel modification, bit modification, image enhancement, image rotation, and truncation.…”
Section: Introductionmentioning
confidence: 99%