Cite this paper
Al-Obaidi, F. and Mohamed Ali, A. (2015) Which Bit Is Better in Least Significant Bit?.
Journal of Information Security,
6, 161-165. doi:
10.4236/jis.2015.63017.
References
[1] Kumar, S., Barnali, B. and Banik, G. (2012) LSB Modification and Phase Encoding Technique of Audio Steganography Revisited. International Journal of Advanced Research in Computer and Communication Engineering, 1, 1-4.
[2] Jayaram, P., Ranganatha, H.R. and Anupama, H.S. (2011) Information Hiding Using Audio Steganography—A Survey. The International Journal of Multimedia & Its Applications (IJMA), 3, 86-96.
http://dx.doi.org/10.5121/ijma.2011.3308
[3] Ali, A.J.M., Al-Zuky, A.A.D. and Ali, F.E.M. (2007) Text Hiding Technique in Digital Image. Al-Mustansiriya Journal of Science, 18.
[4] Aigal, P. and Vasambekar, P. (2012) Hiding Data in Wave Files. International Conference in Recent Trends in Information Technology and Computer Science, Proceedings Published in International Journal of Computer Applications, 20-24.
[5] Chandrakar, P., Choudhary, M. and Badgaiyan, C. (2013) Enhancement in Security of LSB Based Audio Steganography Using Multiple Files. International Journal of Computer Applications, 73, 21-24.
http://dx.doi.org/10.5120/12754-9705
[6] Burate, D.J. and Dixit, M.R. (2013) Performance Improving LSB Audio Steganography Technique. International Journal of Advance Research in Computer Science and Management Studies, 1, 67-75.
[7] Gadicha, A.B. (2011) Audio Wave Steganography. International Journal of Soft Computing and Engineering (IJSCE), 1, 174-176.
[8] Chadha, A., Satam, N., Sood, R. and Bade, D. (2013) An Efficient Method for Image and Audio Steganography Using Least Significant Bit (LSB) Substitution. International Journal of Computer Applications, 77, 37-45.
http://dx.doi.org/10.5120/13547-1342
[9] Al-Obaidi, F.E.M. and Ali, A.J.M. (2013) A Comparison in Colored Text Enhancement. International Journal of Scientific & Engineering Research, 4, 659-665.
[10] Kaushik, P. and Sharma, Y. (2012) Comparison of Different Image Enhancement Techniques Based Upon Psnr & Mse. International Journal of Applied Engineering Research, 7.
[11] Hemalatha, S., Acharya, D.U. and Renuka, A. and Kamath, P.R. (2013) A Secure and High Capacity Image Steganography Technique. Signal & Image Processing: An International Journal (SIPIJ), 4.