2020
DOI: 10.47760/ijcsmc.2020.v09i11.007
|View full text |Cite
|
Sign up to set email alerts
|

Using Logical Operations to Secure LSB2 Data Steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 6 publications
(8 reference statements)
0
4
0
Order By: Relevance
“…Figure 6: LSB data steganography LSB2 works in the same manner as LSB method, but it uses the two least significant bits of the covering 4 bytes (for each character of the message) to do the replacement as shown in figure 7. LSB2 method doubles the capacity of data hiding, and it will equal the image size divided by 4, the extraction and the hiding times required for LSB2 method mostly less than those times required for LSB method [22,27]. LSB2 provides good values for quality parameters MSE, PSNR and CC and some times the quality of the stego_image using LSB2 method is better than the quality of the stego_image obtained by LSB method.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Figure 6: LSB data steganography LSB2 works in the same manner as LSB method, but it uses the two least significant bits of the covering 4 bytes (for each character of the message) to do the replacement as shown in figure 7. LSB2 method doubles the capacity of data hiding, and it will equal the image size divided by 4, the extraction and the hiding times required for LSB2 method mostly less than those times required for LSB method [22,27]. LSB2 provides good values for quality parameters MSE, PSNR and CC and some times the quality of the stego_image using LSB2 method is better than the quality of the stego_image obtained by LSB method.…”
Section: Related Workmentioning
confidence: 99%
“…To enhance LSB2 method of steganography efficiency and to make it secure and capable to provide a high degree of secret message protection the following two points must be considered [22,27]. -Simplification of the operations used for data hiding and data extracting.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations