{"title":"基于最小有效位(LSB)嵌入方法的隐写技术综述","authors":"Kriti Bansal, A. Agrawal, Nency Bansal","doi":"10.1109/ICOEI48184.2020.9142896","DOIUrl":null,"url":null,"abstract":"The way of keeping the existence of the message secret is known as steganography. It is the process of hiding secret information inside a data source. It has many applications in different platforms such as medical, online transactions, defence and many more. It is utilized in circumstances where the secrecy of data is required in communication. In steganography, data can be covered up in content arrangement, images, audio and video. It depends on the quality of a steganographic procedure that lies in its ability to keep the message, as secret as could reasonably be expected and furthermore the measure of information that can be covered up, as enormous as could be allowed. This paper gives a survey on the LSB approach used in this area. Here, LSB technique is used for image, audio as well as video steganography.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":"{\"title\":\"A Survey on Steganography using Least Significant bit (LSB) Embedding Approach\",\"authors\":\"Kriti Bansal, A. Agrawal, Nency Bansal\",\"doi\":\"10.1109/ICOEI48184.2020.9142896\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The way of keeping the existence of the message secret is known as steganography. It is the process of hiding secret information inside a data source. It has many applications in different platforms such as medical, online transactions, defence and many more. It is utilized in circumstances where the secrecy of data is required in communication. In steganography, data can be covered up in content arrangement, images, audio and video. It depends on the quality of a steganographic procedure that lies in its ability to keep the message, as secret as could reasonably be expected and furthermore the measure of information that can be covered up, as enormous as could be allowed. This paper gives a survey on the LSB approach used in this area. Here, LSB technique is used for image, audio as well as video steganography.\",\"PeriodicalId\":267795,\"journal\":{\"name\":\"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"19\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOEI48184.2020.9142896\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOEI48184.2020.9142896","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Survey on Steganography using Least Significant bit (LSB) Embedding Approach
The way of keeping the existence of the message secret is known as steganography. It is the process of hiding secret information inside a data source. It has many applications in different platforms such as medical, online transactions, defence and many more. It is utilized in circumstances where the secrecy of data is required in communication. In steganography, data can be covered up in content arrangement, images, audio and video. It depends on the quality of a steganographic procedure that lies in its ability to keep the message, as secret as could reasonably be expected and furthermore the measure of information that can be covered up, as enormous as could be allowed. This paper gives a survey on the LSB approach used in this area. Here, LSB technique is used for image, audio as well as video steganography.