Least Significant Bit Gaped: A New Method for Image Steganography
Least Significant Bit Gaped: A New Method for Image Steganography
Abstract - Steganography is an information security technique that provides a solution for hiding information. There are different
___
- References
[1] R. J. Anderson and F. A. P. Petitcolas, "On the Limits of Steganography," IEEE Journal on Selected Areas in
Communications, vol. 16, no. 4, pp. 474 - 481, 1998.
[2] Petitcolas, F. A. P. R. J. Anderson and M. G. Kuhn, "Information Hiding - A Survey," Proceedings of the
IEEE, vol. 87, no. 7, pp. 1062 - 1078, 1999.
[3] L. M. Marvel, C. G. Boncelet and C. T. Retter, "Spread Spectrum Image Steganography," IEEE Transactions
on Image Processing, vol. 8, no. 8, pp. 1075 - 1083, 1999.
[4] N. Nikolaidis and I. Pitas, "Digital Image Watermarking: an Overview," in Proceedings IEEE International
Conference on Multimedia Computing and Systems, 1999.
[5] N. F. Johnson and S. Jajodia, "Exploring Steganography: Seeing the Unseen," IEEE, Computer , vol. 31, no.
2, pp. 313 - 336, 1998.
[6] W. Bender, D. Gruhl, N. Morimoto and A. Lu, "Techniques for data hiding," IBM Systems Journal, vol. 35,
no. 3.4, pp. 313 - 336, 1996.
[7] G. L. Smitha and E. Baburaj, "A Survey on Image Steganography Based on Least Significant Bit Matched
Revisited (LSBMR) Algorithm," in International Conference on Emerging Technological Trends (ICETT) ,
2016.
[8] T. Shelare and V. Powar, "A Secure Data Transmission Approach Using B+trees In Steganography," in
International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), 2016.
[9] J. Kumar, "A Novel Approach to Image Steganography using Quadtree Partition," in 2nd International
Conference on Next Generation Computing Technologies (NGCT), 2016.
[10] A. Abuadbba and I. Khalil, "Walsh-Hadamard Based 3D Steganography for Protecting Sensitive Information
in Point-of-Care," IEEE Transactions on Biomedical Engineering, vol. 64, no. 9, pp. 2186 - 2195, 2017.
[11] V. Sharon, B. Karthikeyan, S. Chakravarthy and V. Vaithiyanathan, "Stego Pi : An Automated Security
Module for Text and Image Steganography using Raspberry Pi," in International Conference on Advanced
Communication Control and Computing Technologies (ICACCCT), 2016.
[12] A. A. J. Altaay, S. b. Sahib and M. Zamani, "An Introduction to Image Steganography Techniques," in
International Conference on Advanced Computer Science Applications and Technologies (ACSAT), 2012.
[13] M. Kude and M. Borse, "Skintone Detection Based Steganography Using Wavelet Transform," in
International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), 2016.
[14] J. Fridrich, M. Goljan and R. Du, "Detecting LSB Steganography in Color and Gray-Scale Images," IEEE
MultiMedia, vol. 8, no. 4, pp. 22 - 28, 2001.