2015
DOI: 10.1016/j.ijleo.2015.07.200
|View full text |Cite
|
Sign up to set email alerts
|

An image information hiding using adaptation and radix

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…In general the secret data were converted into binary notation and then it will be embedded into images; but in the MBNS model the binary secret bits were converted into any one of the following numbers system binary, octal or decimal [33].The embedding pixel is selected by the way of the surrounding pixels in all direction; based on the higher difference between the pixels are used to embed the secret bits. Mostly the edge pixels were commonly used to store more data bits.…”
Section: Multi Base Notation System (Mbns)mentioning
confidence: 99%
“…In general the secret data were converted into binary notation and then it will be embedded into images; but in the MBNS model the binary secret bits were converted into any one of the following numbers system binary, octal or decimal [33].The embedding pixel is selected by the way of the surrounding pixels in all direction; based on the higher difference between the pixels are used to embed the secret bits. Mostly the edge pixels were commonly used to store more data bits.…”
Section: Multi Base Notation System (Mbns)mentioning
confidence: 99%
“…Wu [16] proposed the general pixel-value differencing (GPVD) method based on the PVD [8] method, but the quantization range used is not limited to the power of two. Wu [16] adopted the mechanism of multiple-based number conversion [17][18][19][20][21] to embed secret messages into pixel pairs of images.…”
Section: Introductionmentioning
confidence: 99%
“…Firstly; steganography technology can be used to improve the confidentiality payload and robustness integrity of stenographic transactions in distributed hospitals. This technique can provide the confidentiality that represents high image quality, high embedding capacity and attack resistance [ 8 , 20 – 22 , 33 , 36 , 38 – 40 , 47 , 51 , 56 , 57 , 62 , 63 , 71 , 73 – 79 , 81 , 89 , 90 , 96 , 100 – 111 ]. However, no study has yet focused on the integrity of secret data after retrieval from stego images and discovered tampering during data storage in the database.…”
Section: Introductionmentioning
confidence: 99%