Least significant bit steganography technique using modulus operation with pixel selection derived from K-map and Gaussian elimination

As demand for information exchange across the network increases, so is the need for safe covert communication, which can be achieved using steganography. Many steganography techniques have emerged; however the performance of the techniques rely heavily on three major factors, which are the payload,...

全面介绍

Saved in:
书目详细资料
主要作者: Jaafar, Sayuthi
格式: Thesis
语言:English
出版: 2013
主题:
在线阅读:http://eprints.utm.my/id/eprint/33805/5/SayuthiJaafarMFSKSM2013.pdf
标签: 添加标签
没有标签, 成为第一个标记此记录!