Least significant bit steganography technique using modulus operation with pixel selection derived from K-map and Gaussian elimination
As demand for information exchange across the network increases, so is the need for safe covert communication, which can be achieved using steganography. Many steganography techniques have emerged; however the performance of the techniques rely heavily on three major factors, which are the payload,...
محفوظ في:
المؤلف الرئيسي: | |
---|---|
التنسيق: | أطروحة |
اللغة: | English |
منشور في: |
2013
|
الموضوعات: | |
الوصول للمادة أونلاين: | http://eprints.utm.my/id/eprint/33805/5/SayuthiJaafarMFSKSM2013.pdf |
الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|