2018 21st Saudi Computer Society National Computer Conference (NCC) 2018
DOI: 10.1109/ncg.2018.8593199
|View full text |Cite
|
Sign up to set email alerts
|

Odd/Even Differential Image Steganography Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…Steganography is a subpart of the information security process that hides confidential information in a digital medium [12]- [19], which makes the attacker difficult to extract information without knowing the algorithm to extract that information that is sent to the intended recipient [2], [20]- [26]. The digital medium includes all known multimedia types such as video, images, text, and others [27]. One of the most important goals of the process of steganography in digital media is to make the secret message that is sent over the internet difficult to access by unauthorized persons [4], [11], [17], [18], [23], [28]- [34].…”
Section: Introductionmentioning
confidence: 99%
“…Steganography is a subpart of the information security process that hides confidential information in a digital medium [12]- [19], which makes the attacker difficult to extract information without knowing the algorithm to extract that information that is sent to the intended recipient [2], [20]- [26]. The digital medium includes all known multimedia types such as video, images, text, and others [27]. One of the most important goals of the process of steganography in digital media is to make the secret message that is sent over the internet difficult to access by unauthorized persons [4], [11], [17], [18], [23], [28]- [34].…”
Section: Introductionmentioning
confidence: 99%