Question

Use of Least Significant Bit (LSB) in the following standards. (Alteast 3 standards) · USA National...

Use of Least Significant Bit (LSB) in the following standards. (Alteast 3 standards)

· USA National standardization organization
· 800 special publication
· International standardization organization
· Industrial standardization organization (ieee , ica)
· Advanced encryption organization
· National Institute of Standards and Technology

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1)800 special publication

Bit string :- An ordered sequence of 0 and 1 bits. In this Recommendation, the leftmost bit is the most significant bit of the string. The rightmost bit is the least significant bit of the string.

2)Advanced encryption organization

Use of Least Significant Bit (LSB) are very helpful while performing Data Encryption Standard (DES),

Advanced Encryption Standard(AES),TDES and several encryption algorithms.

3)National Institute of Standards and Technology

   National Institute of Standards and Technology. dependent on every bit in a word, and just not the least significant few bits . the LSB bits are helpful in block ciphers.(i.e,for cipher text conversion).

Add a comment
Answer #2

The Least Significant Bit (LSB) technique is commonly used in various standards and organizations for different purposes. Here are three examples of its usage:

  1. USA National Standardization Organization (ANSI): ANSI has adopted the LSB technique in various standards related to data encoding and image compression. For example, the ANSI/AAMI EC13 standard for waveform data formats in medical devices uses LSB encoding to represent waveforms with high precision and minimal loss of information.

  2. National Institute of Standards and Technology (NIST): NIST, a division of the U.S. Department of Commerce, utilizes the LSB technique in the field of steganography and digital watermarking. In NIST Special Publication 800-90B, "Recommendation for the Entropy Sources Used for Random Bit Generation," the LSB method is discussed as a way to embed secret information or watermark data within digital files.

  3. International Organization for Standardization (ISO): ISO has several standards that involve LSB techniques, particularly in the field of audio and video coding. For instance, ISO/IEC 11172-3 and ISO/IEC 13818-3 are standards for MPEG audio coding, where LSB-based techniques are employed to encode audio signals efficiently while maintaining acceptable audio quality.

It's worth noting that while these organizations and standards may employ the LSB technique, the specific details and applications may vary within each standard or organization.


answered by: Mayre Yıldırım
Add a comment
Know the answer?
Add Answer to:
Use of Least Significant Bit (LSB) in the following standards. (Alteast 3 standards) · USA National...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • If an organization is going to have a chance at a successful security program they need...

    If an organization is going to have a chance at a successful security program they need to develop policies that provide direction for all security efforts and guide the conduct of the users. These policies need to be well written to provide the organization with solid guidance to support their security objectives. Identify and briefly describe the three types of security policies. Your response should include a discussion of where each should be used. Where should policy writers look to...

  • need help please! This is a Mixed question/it is worth 3 points/ You have 2 of...

    need help please! This is a Mixed question/it is worth 3 points/ You have 2 of attempts remaining/There is no attempt penalty 04 Question (3 points) Answer the following questions based on the mass spectrum shown below SDRS, National Institute of Advanced Industrial Science and Technology 2nd attempt Part 1 (1 point) See Periodic Table See Hint What is the molecular on in the above mass spectrum? Part 2 (1 point) See Hint Which heteroatom exists in the above mass...

  • Please help me solve The National Institute of Standards and Technology (NIST) offers Standard Reference Materials...

    Please help me solve The National Institute of Standards and Technology (NIST) offers Standard Reference Materials to aid in the calibration of measurement instruments and verify the accuracy of measurements. Suppose a medical researcher wants to verify that the distances he measures with his computed tomography machine are not too large, so he orders a Dimensional Standard for Medical Computed Tomography from NIST. This standard consists of 18 plastic balls held in place by a plastic support structure. The certified...

  • 1-15 3 0 Multiple-Choice Quiz I. Waich of the following are standard eopologies? (Select three) t....

    1-15 3 0 Multiple-Choice Quiz I. Waich of the following are standard eopologies? (Select three) t. What aspects of network cabling do the lEE committees establish? (Select three. . Sear Ring I Speed C Color of sheathing D. Cable types D. Dual-ring 2. Iohn was carrying on at the water cooler the other 7. What types of coas cabling have been used in day, trying to show off his knowledge of networking. computer networkingt (Select three.) He claimed that the...

  • New York State Instructional Time Requirements : Q1-New York State requires at least 12.5 hours of instructional time (5...

    New York State Instructional Time Requirements : Q1-New York State requires at least 12.5 hours of instructional time (50 minutes equals 1 instructional hour) for each credit hour. Instructional time can consist of traditional in-class meetings as well as additional structured instructional activities (beyond usual homework, readings, and other preparation). In this 3-credit course, the required 37.5 hours consists of (i) 30 hours of in-class instruction, and (ii) 7.5 hours of online instructional activities. The on- line instructional activity will...

  • The Jounal of Immunol nes of the National Academy of Sciences USA 89. 6550-6554. 01992, by permis...

    explain figure 2 please on the third page The Jounal of Immunol nes of the National Academy of Sciences USA 89. 6550-6554. 01992, by permision of Proc. Natl. Acad. Sci. USA Vol. 89, pp. 6550-63554, July 1992 Immunolog A 39-kDa protein on activated helper T cells binds CD40 and transduces the signal for cognate activation of B cells RANDOLPH J. NOELLE时, MEENAKSHI ROY.. DAVID M. SHEPHERD., IVAN STAMENKOVICt JEFFREY A. LEDBETTER, AND ALEJANDRO ARUFFo Departmend Microbiology. Dartmouth Medical School One...

  • Implement the following statements using MS430 assembly instructions. You may use more than one, ...

    Implement the following statements using MS430 assembly instructions. You may use more than one, but you should minimize the number of instructions required. You can use both native and emulated instructions. Use hex notation for all numbers 1. (a) Move the word located in register R14 to R15 (b) Increment the word in R6 by 2. (c) Perform a bitwise ANDing of the word located at address 0x0240 with the datum in R15, placing the results in R15. (d) Rotate...

  • 1. Data management, device management and network management of IoT is crucial to data integrity and...

    1. Data management, device management and network management of IoT is crucial to data integrity and transmission. T F 2. An IoT application is a set of wireless devices that act together to perform some sensing and control function. Most applications also provide a user interface, such as a mobile app or cloud-based service. In general, each application is deployed independently of any other applications that may be operating in the area and forms its own separate, cryptographically isolated network....

  • Which of the following matters would an auditor most likely consider to be a significant deficiency to be communicated to the audit committee

    1. Which of the following matters would an auditor most likely consider to be a significant deficiency to be communicated to the audit committee? A. Management's failure to renegotiate unfavorable long-term purchase commitments.B. Recurring operating losses that may indicate going concern problems.C. Evidence of a lack of objectivity by those responsible for accounting decisions.D. Management's current plans to reduce its ownership equity in the entity. 2. After obtaining an understanding of internal control and arriving at a preliminary assessed level...

  • check the answers! Chapter 3 Review L = licensure Applying knowledge LO 3.1 R- Registration Write...

    check the answers! Chapter 3 Review L = licensure Applying knowledge LO 3.1 R- Registration Write for licensure, "C" for certification, and R for registration in the space provided to indicate which is applicable in the following descriptions 1. Involves a mandatory credentialing process established by law, usually at the state level. 2 Involves simply paying a fee. 3. Involves a voluntary credentialing process, usually national in scope, most often sponsored by a private sector group. 4. Required of all...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT