Dual image based LSB steganography
Citations
9 citations
Cites methods from "Dual image based LSB steganography"
...Authors in [10] used a reference image along with the cover image for encoding of the secret bits before embedding into the cover image LSBs....
[...]
8 citations
6 citations
6 citations
Cites methods from "Dual image based LSB steganography"
...The number of pixels varies with a change in the density value due to a change in the lSB pixels, better to be the differences in histogram less between the cover image and the Stego image because these changes can be used to reveal the secret message in stego analysis [12]....
[...]
References
506 citations
"Dual image based LSB steganography" refers background in this paper
...The LSB embedding allows direct replacement of the secret information behind the cover image and only a single bit change of a pixel do not create any perceptible difference in image quality [9]....
[...]
369 citations
"Dual image based LSB steganography" refers background in this paper
...There exists many other variations to this scheme such as instead of replacing only a single bit, two or more least significant bits of cover image can be replaced so that secret message hiding capacity increases but it also deteriorates the quality of cover image with the increase in number of bits changed[7],[8]....
[...]
298 citations
"Dual image based LSB steganography" refers background in this paper
...There exists many other variations to this scheme such as instead of replacing only a single bit, two or more least significant bits of cover image can be replaced so that secret message hiding capacity increases but it also deteriorates the quality of cover image with the increase in number of bits changed[7],[8]....
[...]
143 citations
97 citations
"Dual image based LSB steganography" refers methods in this paper
...A variation of plain LSB with bit inversion technique and RC4 algorithm has been implemented in [12] to improve image quality, security as well as robustness....
[...]
...A large number of different LSB based steganographic methods with variations in hidden data embedding has been proposed and evaluated [11-13, 5-6]....
[...]