منابع مشابه
Comparison of LSB and PVD Steganography Methods
Now a day's as the internet is widely in-use hence the information is transferred with a single click. Information is transferred usingviz; images, videos, texts but the most popular
متن کاملImage/message Steganography using LSB insertion Algorithms for DRM system
Digital Rights Management (DRM) system is the effective scheme for digital transactions. The main disadvantage of DRM is that once the content is decrypted, it can be easily copied using widely available utilities. It can be removed by using protection system like steganography. Steganography is the art of communicating in a way which hides a secret message into the main information or cover. T...
متن کاملA Secured Lsb Image Steganography System Using Edge Detection, Lzw Compression and Hybrid Encryption Methods
Rapid growth of steganographic and cryptographic techniques has a great attention in digital era. Every one need privacy in this internet world. As number of users increases secret communication becomes more and more important. Transposal of data size and file quality through communication channel plays a major challenge for steganographic technique. Least significant bit is one of the simple a...
متن کاملVideo Steganography Using LSB Matching Revisited Algorithm
Video Steganography deals with hiding secret data or information within a video. In this paper, a spatial domain technique for LSB Matching Revisited algorithm (LSBMR) has been proposed, where the secret information is embedded in the cover frames. LSB Matching Revisited(LSBMR) algorithm selects the embedding regions according to the size of secret message and the difference between two consecu...
متن کاملLSB Based Audio Steganography Using Pattern Matching
Security of the digital information is becoming primary concern prior to transmitting the information itself via some media. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. In this proposed method, the carrier file and the secret message are taken into audio format and a pattern matchin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SSRN Electronic Journal
سال: 2018
ISSN: 1556-5068
DOI: 10.2139/ssrn.3283729