Su-Chieng Huang

  • Citations Per Year
Learn More
In this paper, a data hiding scheme has been proposed to efficiently hide the data at the LSBs of a host image. Two operations used in the encryption and decryption processes, transposition and substitution, are performed to disarrange and replace the data stream. First, data are exchanged by the transposition square which is reordered by a sequential of(More)
  • 1