Least significant bit steganography technique using modulus operation with pixel selection derived from K-map and Gaussian elimination

As demand for information exchange across the network increases, so is the need for safe covert communication, which can be achieved using steganography. Many steganography techniques have emerged; however the performance of the techniques rely heavily on three major factors, which are the payload,...

全面介紹

Saved in:
書目詳細資料
主要作者: Jaafar, Sayuthi
格式: Thesis
語言:English
出版: 2013
主題:
在線閱讀:http://eprints.utm.my/id/eprint/33805/5/SayuthiJaafarMFSKSM2013.pdf
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!