Implementation of a logistic map to calculate the bits required for digital image steganography using the least significant bit (LSB) method
The LSB method in steganography usually only uses the last bit or the last few bits that are the same for all pixels. This is very easy to solve by using a bitwise shift left operation so that the last bit becomes the leading bit (MSB). Some techniques combine steganography and cryptography through...
| Main Authors: | Al Maki, Wikky Fawwaz, Muktyas, Indra Bayu, Arifin, Samsul, Suwarno, ., Mohd Khairul Bazli, Mohd Aziz |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Science Publications
2023
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/38273/ http://umpir.ump.edu.my/id/eprint/38273/1/Implementation%20of%20a%20logistic%20map%20to%20calculate%20the%20bits%20required%20for%20digital%20image%20steganography.pdf |
Similar Items
An improved digital watermarking algorithm using combination of least significant bit (LSB) and inverse bit
by: Abdullah Bamatraf, Abdullah Omar
Published: (2012)
by: Abdullah Bamatraf, Abdullah Omar
Published: (2012)
A new digital watermarking algorithm using combination of Least Significant Bit (LSB) and inverse bit
by: Bamatraf, Abdullah, et al.
Published: (2011)
by: Bamatraf, Abdullah, et al.
Published: (2011)
Least Significant Bit (LSB) and Random Right
Circular Shift (RRCF) in digital watermarking
by: Kurdi, Moustafa M., et al.
Published: (2016)
by: Kurdi, Moustafa M., et al.
Published: (2016)
Steganography application for x-ray image of the transferred patient using least significant bit method
by: Nur Shazana, Matri
Published: (2019)
by: Nur Shazana, Matri
Published: (2019)
Adaptive minimum error least significant bit replacement method for steganography using JPG/JPEG and PNG files
by: Wamiliana, Wamiliana, et al.
Published: (2015)
by: Wamiliana, Wamiliana, et al.
Published: (2015)
Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]
by: Ahmad Zukri, Nurul Hidayah, et al.
Published: (2018)
by: Ahmad Zukri, Nurul Hidayah, et al.
Published: (2018)
Graph coloring program of exam scheduling modeling based on bitwise coloring algorithm using python
by: Arifin, Samsul, et al.
Published: (2022)
by: Arifin, Samsul, et al.
Published: (2022)
Steganography : concealing texts within an image using least significant BIT technique on BMP image format / Farabi Aizat Mohd Aminnuddin
by: Mohd Aminnuddin, Farabi Aizat
Published: (2019)
by: Mohd Aminnuddin, Farabi Aizat
Published: (2019)
Steg Analysis Algorithm for Edge Adaptive Least Significant Bit Matching Revisited Detection
by: Edris, Khalid Edris, et al.
Published: (2014)
by: Edris, Khalid Edris, et al.
Published: (2014)
Traid-bit embedding process on Arabic text steganography method
by: Din, Roshidi, et al.
Published: (2021)
by: Din, Roshidi, et al.
Published: (2021)
LSB algorithm based on support vector machine in digital image steganography
by: Hussain, Hanizan Shaker, et al.
Published: (2017)
by: Hussain, Hanizan Shaker, et al.
Published: (2017)
Reversible data hiding scheme based on 3-Least significant bits and mix column transform
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
Steganography : random LSB insertion using discrete logarithm
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
Watermarking technique based on ISB (Intermediate Significant Bit)
by: Zeki, Akram M., et al.
Published: (2010)
by: Zeki, Akram M., et al.
Published: (2010)
Watermaking technique based on ISB (Intermediate Significant Bit)
by: Zeki, Akram M.
Published: (2010)
by: Zeki, Akram M.
Published: (2010)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
An intermediate significant bit (ISB) watermarking technique using neural networks
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Robust image watermarking based on Dual Intermediate Significant Bit (DISB)
by: Mohammed, Ghassan N., et al.
Published: (2014)
by: Mohammed, Ghassan N., et al.
Published: (2014)
Information Security Analysis and Solution using LSB Steganography and
AES Cryptographic Algorithm
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
16 bits x 16 bits booth multiplier using VHDL
by: Muhammad Syafiq, Norashid
Published: (2008)
by: Muhammad Syafiq, Norashid
Published: (2008)
Varsities do their bit
by: The Star,
Published: (2015)
by: The Star,
Published: (2015)
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
by: Mehdi , Hussain
Published: (2017)
by: Mehdi , Hussain
Published: (2017)
A comparison between the 12-bit and 14-bit digital to analog converter
by: Mansouri, Solmaz Rastegar Moghaddam, et al.
Published: (2009)
by: Mansouri, Solmaz Rastegar Moghaddam, et al.
Published: (2009)
Trade-off between robustness, and quality based on dual intermediate significant bits
by: N. Mohammed, Ghassan, et al.
Published: (2013)
by: N. Mohammed, Ghassan, et al.
Published: (2013)
A novel digital watermarking technique based on ISB (Intermediate Significant Bit)
by: Zeki, Akram M., et al.
Published: (2009)
by: Zeki, Akram M., et al.
Published: (2009)
High Watermarking Image Quality Based on Dual Intermediate
Significant Bit (DISB)
by: Mohammed, G, et al.
Published: (2013)
by: Mohammed, G, et al.
Published: (2013)
BLM coming in bits and pieces
Published: (2008)
Published: (2008)
Designing 8-Bit multiplier
by: Yee, M.F
Published: (2006)
by: Yee, M.F
Published: (2006)
A new robust image watermarking method using Dual intermediate significant bits
by: Mohammed, Ghassan N., et al.
Published: (2014)
by: Mohammed, Ghassan N., et al.
Published: (2014)
Prototype development for embedding large amount of information using secure LSB and neural based steganography
by: Saleh, Basam N.
Published: (2009)
by: Saleh, Basam N.
Published: (2009)
32-bit 5-stage RISC pipeline processor with 2-Bit dynamic branch prediction functionality
by: Chang, Boon Chiao
Published: (2015)
by: Chang, Boon Chiao
Published: (2015)
Supportive work environment effect on employee retention at Bit Group Sdn Bhd / Nor Adibah Zailan
by: Zailan, Nor Adibah
Published: (2019)
by: Zailan, Nor Adibah
Published: (2019)
Recognition using robust bit extraction
by: Ngo, David C. L., et al.
Published: (2005)
by: Ngo, David C. L., et al.
Published: (2005)
Wear response of impregnated diamond bits
by: Mostofi, Masood, et al.
Published: (2018)
by: Mostofi, Masood, et al.
Published: (2018)
Low bit rate speech coding
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Low bit rate speech coders
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
The wear mechanisms of impregnated diamond bits
by: Mostofi, Masood, et al.
Published: (2014)
by: Mostofi, Masood, et al.
Published: (2014)
Compiler-compiler for an eight bit microprocessor
by: Kasmiran Jumari,, et al.
Published: (1991)
by: Kasmiran Jumari,, et al.
Published: (1991)
Similar Items
-
An improved digital watermarking algorithm using combination of least significant bit (LSB) and inverse bit
by: Abdullah Bamatraf, Abdullah Omar
Published: (2012) -
A new digital watermarking algorithm using combination of Least Significant Bit (LSB) and inverse bit
by: Bamatraf, Abdullah, et al.
Published: (2011) -
Least Significant Bit (LSB) and Random Right
Circular Shift (RRCF) in digital watermarking
by: Kurdi, Moustafa M., et al.
Published: (2016) -
Steganography application for x-ray image of the transferred patient using least significant bit method
by: Nur Shazana, Matri
Published: (2019) -
Adaptive minimum error least significant bit replacement method for steganography using JPG/JPEG and PNG files
by: Wamiliana, Wamiliana, et al.
Published: (2015)