Development of Multi-Platform Steganographic Software Based on Random-LSB
-
Published:2023-12
Issue:8
Volume:49
Page:922-941
-
ISSN:0361-7688
-
Container-title:Programming and Computer Software
-
language:en
-
Short-container-title:Program Comput Soft
Author:
Tibor Gabor Attila, Katona JozsefORCID
Publisher
Pleiades Publishing Ltd
Reference35 articles.
1. Bender, W., Gruhl, D., Morimoto, N., and Lu, A., Techniques for data hiding, IBM Syst. J., 1996, vol. 35, pp. 313–336. https://doi.org/10.1147/sj.353.0313 2. Petitcolas, F.A., Anderson, R.J., and Kuhn, M.G., Information hiding-a survey, Proc. IEEE, 1999, vol. 87, pp. 1062–1078. https://doi.org/10.1109/5.771065 3. Fridrich, J. and Kodovsky, J., Rich models for steganalysis of digital images, IEEE Trans. Inf. Forensics and Secur., 2012, vol. 7, pp. 868–882. 4. Luo, W., Huang, F., and Huang, J., Edge adaptive image steganography based on LSB matching revisited, IEEE Trans. Inf. Forensics and Secur., 2010, vol. 5, pp. 201–214. 5. Khari, M., Garg, A.K., Gandomi, A.H., Gupta, R., Patan, R., and Balusamy, B., Securing data in Internet of Things (IoT) using cryptography and steganography techniques, IEEE Trans. Syst., Man, Cybernet.: Syst., 2019, vol. 50, pp. 73–80. https://doi.org/10.1109/tsmc.2019.2903785
|
|