2003
DOI: 10.1016/s0031-3203(02)00289-3
|View full text |Cite
|
Sign up to set email alerts
|

Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
150
0
2

Year Published

2007
2007
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 305 publications
(152 citation statements)
references
References 8 publications
0
150
0
2
Order By: Relevance
“…Among the cited cover media, digital images are preferred due to their high frequency over the internet [6]. The image in which the secret data has to be hidden is called the cover image [7] while the image containing the secret data is refers as stego-image (see Figure 2). …”
Section: Introductionmentioning
confidence: 99%
“…Among the cited cover media, digital images are preferred due to their high frequency over the internet [6]. The image in which the secret data has to be hidden is called the cover image [7] while the image containing the secret data is refers as stego-image (see Figure 2). …”
Section: Introductionmentioning
confidence: 99%
“…The initial work on LSB steganography was on LSB Substitution and was explored by (Chang et al, 2002), (THIEN et al, 2003), (Wang et al, 2000(Wang et al, , 2001, (Chang et al, 2003(Chang et al, , 2006 and (Chan et al, 2001(Chan et al, , 2004, which substitutes the same number of bits of each and every pixel of input host images for hiding the secret text or message and give rise to PoVs. They are easily attacked by the Chi-square Test given by (West fled et al, 1999), (Provos et al, 2002) and (Stanley, 2005).…”
Section: Introductionmentioning
confidence: 99%
“…In spatial domain, the secret message is embedded into cover by using direct replacing of least significant bits of cover with the bits of secret message. For example, the methods presented in [3] [4] are stated in this group. The main advantage of spatial steganography to transformation domain steganography is high capacity.…”
Section: Introductionmentioning
confidence: 99%