2013
DOI: 10.5121/ijnsa.2013.5514
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating the Performance of the Secure Block Permutation Image Steganography Algorithm

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…Surveys in the field have been published in 1960 by D.H. Lehmer [8]. Several authors [7,9,10,11,12,13,14,15,16,17,18,19,20,21,22] have developed many methods to generate all the possible permutations of n elements. Also, several works [23, 24,25,26,27,28] in steganography taking advantage of permutations have been done.…”
Section: Permutation Generation Methodsmentioning
confidence: 99%
“…Surveys in the field have been published in 1960 by D.H. Lehmer [8]. Several authors [7,9,10,11,12,13,14,15,16,17,18,19,20,21,22] have developed many methods to generate all the possible permutations of n elements. Also, several works [23, 24,25,26,27,28] in steganography taking advantage of permutations have been done.…”
Section: Permutation Generation Methodsmentioning
confidence: 99%