2011
DOI: 10.1007/978-3-642-22714-1_55
|View full text |Cite
|
Sign up to set email alerts
|

An Adaptive Steganographic Method for Color Images Based on LSB Substitution and Pixel Value Differencing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…In order to construct color shares, a color share generation algorithm with data embedding process is being suggested. The work presented in [24] introduces the steganography strategy that incorporates the possibility of pixel marker with varieties of two normal steganography schemes, known as pixel-value differencing (PVD) and least-significant bit (LSB). In [25], author presented hashing technique using quadratic probing that can be useful in mapping secret bits.…”
Section: Related Workmentioning
confidence: 99%
“…In order to construct color shares, a color share generation algorithm with data embedding process is being suggested. The work presented in [24] introduces the steganography strategy that incorporates the possibility of pixel marker with varieties of two normal steganography schemes, known as pixel-value differencing (PVD) and least-significant bit (LSB). In [25], author presented hashing technique using quadratic probing that can be useful in mapping secret bits.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, it is easy to attack. Hence, there is a trade-off between the amount of secret data that can be embedded, the image distortion, and the security of the stego-image [3].…”
Section: Least Significant Bit Hiding (Lsb) Schemementioning
confidence: 99%
“…So we can say that the LSB method has the following limitations [3]: a) Since LSB is simple and well known, it becomes vulnerable to security attacks. b) Increasing the amount of embedded data in each pixel results in more visual degradation in the image quality.…”
Section: Least Significant Bit Hiding (Lsb) Schemementioning
confidence: 99%
See 1 more Smart Citation
“…To understand the operation of LSB replacement method, suppose we have the following pixels, So we can say that the LSB method has the following limitations [3]: a) Since LSB is simple and well known, it becomes vulnerable to security attacks. b) Increasing the amount of embedded data in each pixel results in more visual degradation in the image quality.…”
Section: Least Significant Bit Hiding (Lsb) Schemementioning
confidence: 99%