2017
DOI: 10.1007/978-981-10-5523-2_14
|View full text |Cite
|
Sign up to set email alerts
|

Digital Forensic Enabled Image Authentication Using Least Significant Bit (LSB) with Tamper Localization Based Hash Function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…The authors in [5] proposed the Least Significant Bit (LSB) techniques benefit for authentication of content of an image. But when the noise has been added in the image, it fails to perceive the image exactly and it is appropriate only for grayscale images.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors in [5] proposed the Least Significant Bit (LSB) techniques benefit for authentication of content of an image. But when the noise has been added in the image, it fails to perceive the image exactly and it is appropriate only for grayscale images.…”
Section: Related Workmentioning
confidence: 99%
“…1 and 0 is placed for higher and lower intensity respectively. It is mentioned in equation(5). ℎ # = $ %0, , < (, %1, , ≥ (, ∀ k, l ∈ [0, 63] 2…”
mentioning
confidence: 99%
“…Stego image generation process is implemented by replacing the least significant bits of cover image with the most significant bits of secret information. In (Das, Samaddar, and Keserwani 2018), authors proposed to generate an LSB based hash function for the image authentication process, which can provide good imperceptibility between the original image and stego image with hash bits.…”
Section: Least Significant Bit Steganographymentioning
confidence: 99%
“…In this experiment, we evaluate the robustness when recovering the secret image from the target image. For LSB steganography and spatial domain watermarking, we choose LSB-TLH (Das, Samaddar, and Keserwani 2018). For content adaptive steganography, we choose WOW (Holub and Fridrich 2012), HUGO (Pevnỳ, Filler, and Bas 2010) and S-UNIWARD (Holub, Fridrich, and Denemark 2014).…”
Section: Quantitative Comparative Experimentsmentioning
confidence: 99%