Least significant bit steganography technique using modulus operation with pixel selection derived from K-map and Gaussian elimination
As demand for information exchange across the network increases, so is the need for safe covert communication, which can be achieved using steganography. Many steganography techniques have emerged; however the performance of the techniques rely heavily on three major factors, which are the payload,...
Saved in:
主要作者: | |
---|---|
格式: | Thesis |
語言: | English |
出版: |
2013
|
主題: | |
在線閱讀: | http://eprints.utm.my/id/eprint/33805/5/SayuthiJaafarMFSKSM2013.pdf |
標簽: |
添加標簽
沒有標簽, 成為第一個標記此記錄!
|