2017 International Conference on Recent Innovations in Signal Processing and Embedded Systems (RISE) 2017
DOI: 10.1109/rise.2017.8378162
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of LSB methods and pattern

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…The above surveys on data hiding in digital media are dedicated to either digital audio, images, videos, or 3D media while LSB data hiding is covered as one among numerous other approaches. Several conference papers providing surveys that focus on LSB data hiding have been provided as [41][42][43][44][45][46][47]. To the best of our knowledge, a comprehensive survey on LSB data hiding that considers digital audio, images, videos, and 3D media does not exist.…”
Section: Digitalmentioning
confidence: 99%
“…The above surveys on data hiding in digital media are dedicated to either digital audio, images, videos, or 3D media while LSB data hiding is covered as one among numerous other approaches. Several conference papers providing surveys that focus on LSB data hiding have been provided as [41][42][43][44][45][46][47]. To the best of our knowledge, a comprehensive survey on LSB data hiding that considers digital audio, images, videos, and 3D media does not exist.…”
Section: Digitalmentioning
confidence: 99%
“…Another approach is to hide text in a format other than text, e.g., in image files. The basic way that uses images to hide a confidential message is called LSB (Least Significant Bit) method [28]. It uses the least significant bits of the pixel RGB color components to enter the bits of a confidential message.…”
Section: Steganography Of the Textmentioning
confidence: 99%