Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] A review on LSB substitution and PVD based image steganography techniques
There has been a tremendous growth in Information and Communication technologies
during the last decade. Internet has become the dominant media for data communication …
during the last decade. Internet has become the dominant media for data communication …
[PDF][PDF] Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats
MM Hashim, MSM Rahim, FA Johi… - … of Engineering & …, 2018 - researchgate.net
Recently, Steganography is an outstanding research area which used for data protection
from unauthorized access. Steganography is defined as the art and science of covert …
from unauthorized access. Steganography is defined as the art and science of covert …
Performance evaluation parameters of image steganography techniques
This paper illustrates the various performance evaluation parameters of image
steganography techniques. The performance of a steganographic technique can be rated by …
steganography techniques. The performance of a steganographic technique can be rated by …
A steganographic method combining LSB substitution and PVD in a block
G Swain - Procedia Computer Science, 2016 - Elsevier
In the recent past some steganography techniques by combining least significant bit (LSB)
substitution and pixel value differencing (PVD) have been proposed to improve upon the …
substitution and pixel value differencing (PVD) have been proposed to improve upon the …
Adaptive pixel value differencing steganography using both vertical and horizontal edges
G Swain - Multimedia Tools and Applications, 2016 - Springer
This paper proposes two pixel value differencing (PVD) steganography techniques by
considering adaptive ranges to improve the security. In the first technique, the image is …
considering adaptive ranges to improve the security. In the first technique, the image is …
Review on techniques and file formats of image compression
This paper presents a review of the compression technique in digital image processing. As
well as a brief description of the main technologies and traditional format that commonly …
well as a brief description of the main technologies and traditional format that commonly …
A comprehensive survey on stegomalware detection in digital media, research challenges and future directions
Stegomalware is a malicious activity that employs steganography techniques to hide
malicious code within innocent-looking files. The hidden code can then be executed to …
malicious code within innocent-looking files. The hidden code can then be executed to …
Digital image steganography using LSB substitution, PVD, and EMD
To protect from pixel difference histogram (PDH) analysis and RS analysis, two hybrid image
steganography techniques by appropriate combination of LSB substitution, pixel value …
steganography techniques by appropriate combination of LSB substitution, pixel value …
[PDF][PDF] Digital image steganography using nine-pixel differencing and modified LSB substitution
G Swain - Indian Journal of Science and …, 2014 - sciresol.s3.us-east-2.amazonaws …
To provide higher embedding capacity without sacrificing the imperceptibility, a novel
steganographic technique based on nine-pixel differencing with modified Least Significant …
steganographic technique based on nine-pixel differencing with modified Least Significant …
[PDF][PDF] An improved data hiding technique using bit differencing and LSB matching
This paper proposes an improved image steganographic technique based on the principle
of modified least significant bit (LSB) substitution and LSB matching, to improve the capacity …
of modified least significant bit (LSB) substitution and LSB matching, to improve the capacity …