Least significant bit steganography technique using modulus operation with pixel selection derived from K-map and Gaussian elimination

As demand for information exchange across the network increases, so is the need for safe covert communication, which can be achieved using steganography. Many steganography techniques have emerged; however the performance of the techniques rely heavily on three major factors, which are the payload,...

Full description

Bibliographic Details
Main Author: Jaafar, Sayuthi (Author)
Format: Thesis
Published: 2013-01.
Subjects:
Online Access:Get fulltext

Similar Items