Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,268,536 papers from all fields of science
Search
Sign In
Create Free Account
Least significant bit
Known as:
Least significant bits
, LSB
, Least-significant bit
Expand
In computing, the least significant bit (LSB) is the bit position in a binary integer giving the units value, that is, determining whether the number…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
1-Wire
AES3
Answer to reset
Baudot code
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Hash Based Least Significant Bit Technique For Video Steganography
P. Deshmukh
,
Bhagyashri Rahangdale
2014
Corpus ID: 64044903
The Hash Based Least Significant Bit Technique For Video Steganography deals with hiding secret message or information within a…
Expand
Highly Cited
2008
Highly Cited
2008
A 9 b, 1.25 ps Resolution Coarse–Fine Time-to-Digital Converter in 90 nm CMOS that Amplifies a Time Residue
Minjae Lee
,
A. Abidi
IEEE Journal of Solid-State Circuits
2008
Corpus ID: 26788005
This paper presents the design of a coarse-fine time-to-digital converter (TDC) that amplifies a time residue to improve time…
Expand
Highly Cited
2008
Highly Cited
2008
Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits
Chunfang Yang
,
Fenlin Liu
,
Xiangyang Luo
,
B. Liu
IEEE Transactions on Information Forensics and…
2008
Corpus ID: 15668338
Replacement of least-significant bit plane is one of the popular steganography techniques in digital images because of its…
Expand
Highly Cited
2008
Highly Cited
2008
Planning in information space for a quadrotor helicopter in a GPS-denied environment
Ruijie He
,
Sam Prentice
,
N. Roy
IEEE International Conference on Robotics and…
2008
Corpus ID: 17677091
This paper describes a motion planning algorithm for a quadrotor helicopter flying autonomously without GPS. Without accurate…
Expand
Highly Cited
2007
Highly Cited
2007
Steganalysis of Embedding in Two Least-Significant Bits
Andrew D. Ker
IEEE Transactions on Information Forensics and…
2007
Corpus ID: 14558013
This paper proposes steganalysis methods for extensions of least-significant bit (LSB) overwriting to both of the two lowest bit…
Expand
Highly Cited
2007
Highly Cited
2007
Grain: a stream cipher for constrained environments
Martin Hell
,
T. Johansson
,
W. Meier
International Journal of Wireless and Mobile…
2007
Corpus ID: 784379
A new stream cipher, Grain, is proposed. The design targets hardware environments where gate count, power consumption and memory…
Expand
Highly Cited
2007
Highly Cited
2007
An Ultra Low Energy 12-bit Rate-Resolution Scalable SAR ADC for Wireless Sensor Nodes
N. Verma
,
A. Chandrakasan
IEEE Journal of Solid-State Circuits
2007
Corpus ID: 18808003
A resolution-rate scalable ADC for micro-sensor networks is described. Based on the successive approximation register (SAR…
Expand
Highly Cited
2004
Highly Cited
2004
Improved Detection of LSB Steganography in Grayscale Images
Andrew D. Ker
Information Hiding
2004
Corpus ID: 6340948
We consider methods for answering reliably the question of whether an image contains hidden data; the focus is on grayscale…
Expand
Review
2002
Review
2002
Practical steganalysis of digital images: state of the art
J. Fridrich
,
M. Goljan
IS&T/SPIE Electronic Imaging
2002
Corpus ID: 9473379
Steganography is the art of hiding the very presence of communication by embedding secret messages into innocuous looking cover…
Expand
Highly Cited
1999
Highly Cited
1999
Some Notes on Steganography
Notes on
1999
Corpus ID: 55288134
. This essay presents some observations concerning low rate steganography in images where the amount of covert information is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE