2014
DOI: 10.3923/itj.2014.895.903
|View full text |Cite
|
Sign up to set email alerts
|

Information Hiding Algorithm with Strong Security Based on Run Length

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…The author of [2] proposes an algorithm based on gray level modification and multilevel encryption, which improves the image quality of the carrier and presents a greater challenge to the steganalysis. In literature [3], a steganography algorithm based on run length is proposed. The algorithm has good properties to avoid detection of LSB.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The author of [2] proposes an algorithm based on gray level modification and multilevel encryption, which improves the image quality of the carrier and presents a greater challenge to the steganalysis. In literature [3], a steganography algorithm based on run length is proposed. The algorithm has good properties to avoid detection of LSB.…”
Section: Introductionmentioning
confidence: 99%
“…Digital images as important carrier information are widely used in steganography. Presently steganography has achieved lots of research results, mainly in spatial and frequency domain of the image [1][2][3][4][5][6][7]. LSB (Least Significant Bit) replacement algorithm is proposed in [1].…”
Section: Introductionmentioning
confidence: 99%