2016 Sixth International Conference on Innovative Computing Technology (INTECH) 2016
DOI: 10.1109/intech.2016.7845022
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of data hiding in R, G and B channels of color image using various number of LSBs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…Steganographic methods embed a secret message into a cover file before transmission. Therefore, only the sender and the recipient know of its existence or understand it, where it is not obviously been seen by a third-party observer [12–14]. The secret message (plain text) is one in which a sender inserts into a cover file.…”
Section: Introductionmentioning
confidence: 99%
“…Steganographic methods embed a secret message into a cover file before transmission. Therefore, only the sender and the recipient know of its existence or understand it, where it is not obviously been seen by a third-party observer [12–14]. The secret message (plain text) is one in which a sender inserts into a cover file.…”
Section: Introductionmentioning
confidence: 99%
“…Here, we observe that ( 9) is equivalent to (7) with Θ = A, s = z and y = b. Finally, we briefly mention a theoretical result related to reconstruction.…”
Section: Reconstruction Of the Approximate Signalmentioning
confidence: 70%
“…In the spatial domain based image steganography scheme, secret data is embedded directly into the image by some modification in the values of the image pixels. Some well-known schemes here are listed in [2,[5][6][7][8][9][10][11]. In the transform domain based image steganography scheme, first, the image is transformed into frequency components, and then the secret data is embedded into these components.…”
Section: Introductionmentioning
confidence: 99%
“…Here, we observe that ( 9) is equivalent to (7) with Θ = A, s = z and y = b. Finaly, we briefly mention a theoretical result related to reconstruction. In [48], it is shown that for sufficiently small constant C (C > 0), the K-sparse signal s of size N can be approximately reconstructed from M measurements y if M ≥ CK (log N ).…”
Section: Reconstruction Of the Approximate Signalmentioning
confidence: 73%