LSB Data Hiding in Digital Media: A Survey
نویسندگان
چکیده
Data hiding or information is a prominent class of security that aims at reliably conveying secret data embedded in cover object over covert channel. Digital media such as audio, image, video, and three-dimensional (3D) can act objects to carry
منابع مشابه
A survey on digital data hiding schemes: principals, algorithms, and applications
This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...
متن کاملLSB Steganography Based Reversible Data Hiding
-This paper introduces a new, principled approach to least significant bit (LSB) steganography in digital signals such as images. It is shown that privacy protection of medical images with information using histogram shifting based reversible data hiding.First of all, the patient’s privacies need to be preserved.Therefore, embedding secret data into the medical images would be one of the useful...
متن کاملA Novel Approach Towards LSB Substituted Data Hiding In Images
In this paper a novel approach towards LSB substituted data hiding in images has been proposed based on random bit substitution which not only improves the robustness and security of the watermarking scheme but also significantly improves the stego image quality which is visually indistinguishable from the original cover image. The the watermarked image shows marked improvement and greater resi...
متن کاملA Robust Data Hiding Technique based on LSB Matching
Many researchers are working on information hiding techniques using different ideas and areas to hide their secrete data. This paper introduces a robust technique of hiding secret data in image based on LSB insertion and RSA encryption technique. The key of the proposed technique is to encrypt the secret data. Then the encrypted data will be converted into a bit stream and divided it into numbe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: EAI endorsed transactions on industrial networks and intelligent systems
سال: 2022
ISSN: ['2410-0218']
DOI: https://doi.org/10.4108/eai.5-4-2022.173783