Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Most significant bit

Known as: Significant bit, Lsbit, Msbit 
In computing, the most significant bit (MSB, also called the high-order bit) is the bit position in a binary number having the greatest value. The… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
This paper presents a learning-based steganalysis/detection method to attack spatial domain least significant bit LSB matching… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Steganalysis is the art of detecting the message's existence and blockading the covert communication. Various steganography… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Increased use of electronic communication has given birth to new ways of transmitting information securely. Audio steganography… Expand
  • figure 2
  • figure I
  • figure 3
  • figure 4
  • table II
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Increasing the image size of a video sequence aggravates the memory bandwidth problem of a video coding system. Despite many… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • table II
Is this relevant?
Highly Cited
2010
Highly Cited
2010
A 1.2 V 10-bit 100 MS/s Successive Approximation (SA) ADC is presented. The scheme achieves high-speed and low-power operation… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Summary A new steganography approach for data hiding is proposed. This approach uses the Least Significant Bits (LSB) insertion… Expand
  • figure 1
  • figure 2
  • figure 5
  • figure 4
  • table 2
Is this relevant?
Highly Cited
2008
Highly Cited
2008
This paper describes a motion planning algorithm for a quadrotor helicopter flying autonomously without GPS. Without accurate… Expand
  • figure 1-1
  • figure 1-2
  • figure 1-3
  • figure 2-1
  • figure 3-1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
  • Andrew D. Ker
  • IEEE Transactions on Information Forensics and…
  • 2007
  • Corpus ID: 14558013
This paper proposes steganalysis methods for extensions of least-significant bit (LSB) overwriting to both of the two lowest bit… Expand
  • table I
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1999
Highly Cited
1999
A 1.5-V, 10-bit, 14.3-MS/s pipeline analog-to-digital converter was implemented in a 0.6 /spl mu/m CMOS technology. Emphasis was… Expand
Is this relevant?
Highly Cited
1996
Highly Cited
1996
We show that computing the most significant bits of the secret key in a Diffie-Hellman key-exchange protocol from the public keys… Expand
Is this relevant?