您现在的位置: 首页> 研究主题> LSB

LSB

LSB的相关文献在1992年到2022年内共计237篇,主要集中在自动化技术、计算机技术、无线电电子学、电信技术、化学工业 等领域,其中期刊论文179篇、会议论文6篇、专利文献52篇;相关期刊137种,包括科技信息、北京石油化工学院学报、电路与系统学报等; 相关会议6种,包括广西计算机学会2010年年会、2007年北京地区高校研究生学术交流会、第十一届计算机工程与工艺全国学术年会等;LSB的相关文献由440位作者贡献,包括罗向阳、刘粉林、陈建新等。

LSB—发文量

期刊论文>

论文:179 占比:75.53%

会议论文>

论文:6 占比:2.53%

专利文献>

论文:52 占比:21.94%

总计:237篇

LSB—发文趋势图

LSB

-研究学者

  • 罗向阳
  • 刘粉林
  • 陈建新
  • 刘文芬
  • 张卫明
  • 徐俊
  • 杨义先
  • 杨衣社
  • 汤光明
  • 田茂华
  • 期刊论文
  • 会议论文
  • 专利文献

搜索

排序:

年份

    • Rizwan Taj; Feng Tao; Shahzada Khurram; Ateeq Ur Rehman; Syed Kamran Haider; Akber Abid Gardezi; Saima Kanwal
    • 摘要: In telemedicine,the realization of reversible watermarking through information security is an emerging research field.However,adding watermarks hinders the distribution of pixels in the cover image because it creates distortions(which lead to an increase in the detection probability).In this article,we introduce a reversible watermarking method that can transmit medical images with minimal distortion and high security.The proposed method selects two adjacent gray pixels whose least significant bit(LSB)is different from the relevant message bit and then calculates the distortion degree.We use the LSB pairing method to embed the secret matrix of patient record into the cover image and exchange pixel values.Experimental results show that the designed method is robust to different attacks and has a high PSNR(peak signal-to-noise ratio)value.The MRI image quality and imperceptibility are verified by embedding a secret matrix of up to 262,688 bits to achieve an average PSNR of 51.657 dB.In addition,the proposed algorithm is tested against the latest technology on standard images,and it is found that the average PSNR of our proposed reversible watermarking technology is higher(i.e.,51.71 dB).Numerical results show that the algorithm can be extended to normal images and medical images.
    • Iman Almomani; Aala AlKhayer; Walid El-Shafai
    • 摘要: Ransomware is considered one of the most threatening cyberattacks.Existing solutions have focused mainly on discriminating ransomware by analyzing the apps themselves,but they have overlooked possible ways of hiding ransomware apps and making them difficult to be detected and then analyzed.Therefore,this paper proposes a novel ransomware hiding model by utilizing a block-based High-Efficiency Video Coding(HEVC)steganography approach.The main idea of the proposed steganography approach is the division of the secret ransomware data and cover HEVC frames into different blocks.After that,the Least Significant Bit(LSB)based Hamming Distance(HD)calculation is performed amongst the secret data’s divided blocks and cover frames.Finally,the secret data bits are hidden into the marked bits of the cover HEVC frame-blocks based on the calculated HD value.The main advantage of the suggested steganography approach is the minor impact on the cover HEVC frames after embedding the ransomware while preserving the histogram attributes of the cover video frame with a high imperceptibility.This is due to the utilization of an adaptive steganography cost function during the embedding process.The proposed ransomware hiding approach was heavily examined using subjective and objective tests and applying different HEVC streams with diverse resolutions and different secret ransomware apps of various sizes.The obtained results prove the efficiency of the proposed steganography approach by achieving high capacity and successful embedding process while ensuring the hidden ransomware’s undetectability within the video frames.For example,in terms of embedding quality,the proposed model achieved a high peak signal-to-noise ratio that reached 59.3 dB and a low mean-square-error of 0.07 for the examined HEVC streams.Also,out of 65 antivirus engines,no engine could detect the existence of the embedded ransomware app.
    • N.Shyla; K.Kalimuthu
    • 摘要: The term“steganography”is derived from the Greek words steganos,which means“verified,concealed,or guaranteed”,and graphein,which means“writing”.The primary motivation for considering steganography is to prevent unapproved individuals from obtaining disguised data.With the ultimate goal of comprehending the fundamental inspiration driving the steganography procedures,there should be no significant change in the example report.The Least Significant Bit(LSB)system,which is one of the methodologies for concealing propelled picture data,is examined in this assessment.In this evaluation,another procedure for data stowing indefinitely is proposed with the ultimate goal of limiting the progressions occurring in the spread record while hiding the data with the LSB technique and making the best cover to make it difficult to get concealed data.The RGB(Red,Green,and Blue)pixel esteem based stegnography technique is proposed in this proposition.The claim to fame of this calculation is that,unlike other stegnography calculations,we do not change the pixels unless absolutely necessary.
    • Shady Y.El-mashad; Amani M.Yassen; Abdulwahab K.Alsammak; Basem M.Elhalawany
    • 摘要: The last decade shows an explosion of using social media,which raises several challenges related to the security of personal files including images.These challenges include modifying,illegal copying,identity fraud,copyright protection and ownership of images.Traditional digital watermarking techniques embed digital information inside another digital information without affecting the visual quality for security purposes.In this paper,we propose a hybrid digital watermarking and image processing approach to improve the image security level.Specifically,variants of the widely used Least-Significant Bit(LSB)watermarking technique are merged with a blob detection algorithm to embed information into the boundary pixels of the largest blob of a digital image.The proposed algorithms are tested using several experiments and techniques,which are followed by uploading the watermarked images into a social media site to evaluate the probability of extracting the embedding watermarks.The results show that the proposed approaches outperform the traditional LSB algorithm in terms of time,evaluation criteria and the percentage of pixels that have changed.
    • 孙晓罡
    • 摘要: 研究了对秘密信息预处理的方法,并根据秘密信息的类型选择不同的预处理方法.对文本类型的秘密信息使用加密的方法,而对秘密图像则采用置乱的方法.针对图像信息隐藏中LSB算法,分析了一些检测率高,性能稳定,且适用于灰度图像和彩色图像的检测算法.
    • 燕雨薇; 余粟
    • 摘要: 快速响应码(QR码)以存储信息量大、编解码速度快、安全性高等特点,广泛应用于各个领域。但QR码本身并不具备安全保护能力,通过分析其编解码原理,本文提出一种结合信息隐藏和可视秘密共享的QR码安全认证技术,可应用于用户信息传递及身份认证。实验证明本方法具备可行性,且具有透明性高、计算成本低、效率快等优点,提高了信息传递的安全性。
    • 燕雨薇; 余粟
    • 摘要: 快速响应码(QR码)以存储信息量大、编解码速度快、安全性高等特点,广泛应用于各个领域.但QR码本身并不具备安全保护能力,通过分析其编解码原理,本文提出一种结合信息隐藏和可视秘密共享的QR码安全认证技术,可应用于用户信息传递及身份认证.实验证明本方法具备可行性,且具有透明性高、计算成本低、效率快等优点,提高了信息传递的安全性.
    • 刘孔玲
    • 摘要: 随着网络技术的发展,信息隐藏技术是信息安全一个重要的方面.本文是基于图像信息隐藏方法的综述,介绍了图像信息隐藏的方法、 原理以及应用.
  • 查看更多

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号