Least significant bit steganography technique using modulus operation with pixel selection derived from K-map and Gaussian elimination

As demand for information exchange across the network increases, so is the need for safe covert communication, which can be achieved using steganography. Many steganography techniques have emerged; however the performance of the techniques rely heavily on three major factors, which are the payload,...

Full description

Saved in:
Bibliographic Details
Main Author: Jaafar, Sayuthi
Format: Thesis
Published: 2013
Online Access:http://eprints.utm.my/id/eprint/33805/5/SayuthiJaafarMFSKSM2013.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!