Author:
Nkuna Caswell,Esenogho Ebenezer,Heymann Reolyn,Matlotse Edwin
Publisher
Engineering and Technology Publishing
Subject
Artificial Intelligence,Computer Networks and Communications,Computer Science Applications,Information Systems,Software
Reference30 articles.
1. [1] A. A. Abdelmged and S. S. Al-Hussien, "Image steganography technique by using braille method of blind people (LSBraille)," International Journal of Image Processing, vol. 7, no. 1, pp. 81-89, 2013.
2. [2] W. G. Singh, M. Shikhar, S. Kunwar, and S. Kapil, "Robust stego-key directed LSB substitution scheme based upon cuckoo search and chaotic map," International Journal for Light and Electron Optics, vol. 170, no. 10, 2018, doi: 10.1016/j.ijleo.2018.04.135
3. [3] A. A Labaichi, M. A. A. Al-Dabbas, and A. Salih, "Image steganography using least significant bit and secret map techniques," International Journal of Electrical and Computer Engineering, vol. 10, no. 1, pp. 935-946, 2020, doi: 10.11591/ijece.v10i1.pp935-946
4. [4] H. K. Tayyeh and A. S. A. Al-Jumaili, "A combination of least significant bit and deflate compression for image steganography," International Journal of Electrical and Computer Engineering, vol. 12, no. 1, pp. 358-364, 2022, doi: 10.11591/ijece.v12i1.pp358-364
5. [5] M. U. Umamaheshwari, "Analysis of different steganographic algorithm for secured data hiding," International Journal of Computer Science and Network Security, vol. 10, no. 8, pp. 154-160, 2010.