Least significant bit steganography technique using modulus operation with pixel selection derived from K-map and Gaussian elimination
As demand for information exchange across the network increases, so is the need for safe covert communication, which can be achieved using steganography. Many steganography techniques have emerged; however the performance of the techniques rely heavily on three major factors, which are the payload,...
Saved in:
主要作者: | |
---|---|
格式: | Thesis |
语言: | English |
出版: |
2013
|
主题: | |
在线阅读: | http://eprints.utm.my/id/eprint/33805/5/SayuthiJaafarMFSKSM2013.pdf |
标签: |
添加标签
没有标签, 成为第一个标记此记录!
|
成为第一个发表评论!