The 7th International Conference on Information Technology 2015
DOI: 10.15849/icit.2015.0048
|View full text |Cite
|
Sign up to set email alerts
|

Hide image in image based on LSB Replacement and Arnold Transform

Abstract: For quite a long time, computer security was a rather narrow field of study that was populated mainly by theoretical computer scientists, electrical engineers, and applied mathematicians. Data hiding techniques have taken important role with the rapid growth of intensive transfer of multimedia content and secret communications. There are many techniques used for data hiding and the well-known technique is the Steganography. Steganography is the art of hiding information in ways that prevent detection. For hidi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 6 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?