Remainder with Threshold Substitution Data Hiding Scheme: Counterexamples and Modification

dc.contributor.authorChefranov, Alexander
dc.contributor.authorOz, Gurcu
dc.date.accessioned2026-02-06T18:50:51Z
dc.date.issued2023
dc.departmentDoğu Akdeniz Üniversitesi
dc.description.abstractA well-known data hiding scheme, Remainder with Threshold substitution (RT), is analyzed. RT uses a threshold value, T, and two moduli numbers, m(u), and m(l), m(l)
dc.identifier.doi10.1109/TLA.2023.10305236
dc.identifier.endpage1265
dc.identifier.issn1548-0992
dc.identifier.issue12
dc.identifier.orcid0000-0002-6744-7427
dc.identifier.orcid0000-0003-4116-520X
dc.identifier.scopus2-s2.0-85176389691
dc.identifier.scopusqualityQ2
dc.identifier.startpage1255
dc.identifier.urihttps://doi.org/10.1109/TLA.2023.10305236
dc.identifier.urihttps://hdl.handle.net/11129/15081
dc.identifier.volume21
dc.identifier.wosWOS:001100852800003
dc.identifier.wosqualityQ3
dc.indekslendigikaynakWeb of Science
dc.indekslendigikaynakScopus
dc.language.isoen
dc.publisherIEEE-Inst Electrical Electronics Engineers Inc
dc.relation.ispartofIeee Latin America Transactions
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı
dc.rightsinfo:eu-repo/semantics/closedAccess
dc.snmzKA_WoS_20260204
dc.subjectData hiding scheme
dc.subjectRemainder with Threshold substitution
dc.subjectCover Image
dc.subjectPixel
dc.subjectSecret Embedding
dc.subjectSecret Extraction
dc.titleRemainder with Threshold Substitution Data Hiding Scheme: Counterexamples and Modification
dc.typeArticle

Files