549
Views
39
CrossRef citations to date
0
Altmetric
Original Article

Data hiding based on generalised exploiting modification direction method

&
Pages 484-490 | Accepted 03 Apr 2012, Published online: 18 Nov 2013

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (1)

Ju-Yuan Hsiao, Ai-Chieh Pan & Po-Yueh Chen. (2021) An adaptive reversible data hiding scheme using dual stego-image. International Journal of Computers and Applications 43:3, pages 282-291.
Read now

Articles from other publishers (38)

Hany Y. Ahmed, Taha Elsayed Taha, Adel S. El-Fishawy & Emad A. Elshazly. (2023) A Software Design and FPGA Implementation of Telemedicine Security System. A Software Design and FPGA Implementation of Telemedicine Security System.
Sunil K Moon. (2023) Forensic multi-dimensional Ary exploited modified direction data embedding approach to increase imperceptibility and robustness of secured data. Multimedia Tools and Applications 82:23, pages 35091-35120.
Crossref
Zhang Yu, Zhang Ju, Li Teng, Wang Sha & Pan Dongbo. (2022) Large-capacity information hiding scheme based on minimum pixel modification. Egyptian Informatics Journal 23:4, pages 97-108.
Crossref
Murat UZUN & Serdar SOLAK. (2022) GÖRÜNTÜ STEGANOGRAFİSİNDE YAYGIN KULLANILAN VERİ GİZLEME TEKNİKLERİNİN İNCELENMESİANALYSIS OF COMMONLY USED IMAGE STEGANOGRAPHY DATA HIDING TECHNIQUES IN SPATIAL DOMAIN. Mühendislik Bilimleri ve Tasarım Dergisi 10:3, pages 816-830.
Crossref
Hung-Jui Ko, Cheng-Ta Huang, Hsueh-Wen Tseng & Shiuh-Jeng Wang. (2022) Efficient Cost-Reduced With High-Quality Image of Imperceptible Steganography Using Modulo and Magic Cube. IEEE Access 10, pages 67686-67693.
Crossref
Ke Luo & Wei Gao. (2021) Research on GEMD Image Hiding Technique Based on Chinese Remainder Theorem. Research on GEMD Image Hiding Technique Based on Chinese Remainder Theorem.
Hui-Shih Leng, Jin-Fa Lee & Hsien-Wen Tseng. (2021) A high payload EMD-based steganographic method using two extraction functions. Digital Signal Processing 113, pages 103026.
Crossref
J. Jennifer Ranjani & Fauzan Zaid. (2021) Pseudo magic cubes: A multidimensional data hiding scheme exploiting modification directions for large payloads. Computers & Electrical Engineering 89, pages 106928.
Crossref
T. D. Sairam & K. Boopathybagan. (2019) An improved high capacity data hiding scheme using pixel value adjustment and modulus operation. Multimedia Tools and Applications 79:23-24, pages 17003-17013.
Crossref
Serdar Solak. (2020) High Embedding Capacity Data Hiding Technique Based on EMSD and LSB Substitution Algorithms. IEEE Access 8, pages 166513-166524.
Crossref
Yu Zhang, Sha Wang, Teng Li, Bo Liu & Dong-Bo Pan. (2020) Modulus Calculations on Prime Number Algorithm for Information Hiding With High Comprehensive Performance. IEEE Access 8, pages 85309-85320.
Crossref
Wen-Chung Kuo, Yi-Jiun Chen, Chun-Cheng Wang & Yu-Chih Huang. 2020. Security with Intelligent Computing and Big-Data Services 2019. Security with Intelligent Computing and Big-Data Services 2019 64 75 .
Wen-Chung Kuo, Ren-Jun Xiao, Chun-Cheng Wang & Yu-Chih Huang. 2019. Biological Responses to Nanoscale Particles. Biological Responses to Nanoscale Particles 103 115 .
Fei Peng, Yu Zhao, Xiang Zhang, Min Long & Wei-qiang Pan. (2019) Reversible data hiding based on RSBEMD coding and adaptive multi-segment left and right histogram shifting. Signal Processing: Image Communication.
Crossref
Yan-Xiao Liu, Ching-Nung Yang, Qin-Dong Sun, Song-Yu Wu, Shin-Shang Lin & Yung-Shun Chou. (2019) Enhanced embedding capacity for the SMSD-based data-hiding method. Signal Processing: Image Communication 78, pages 216-222.
Crossref
S.K. Ghosal & J.K. Mandal. (2019) On the use of the Stirling Transform in image steganography. Journal of Information Security and Applications 46, pages 320-330.
Crossref
Wen-Chung KuoChun-Cheng WangShao-Hung KuoLih-Chyau Wuu. (2019) Verifiable data hiding scheme with tamper detection. Journal of Intelligent & Fuzzy Systems 36:2, pages 1311-1321.
Crossref
S. K. Ghosal, J. K. Mandal & R. Sarkar. (2018) High payload image steganography based on Laplacian of Gaussian (LoG) edge detector. Multimedia Tools and Applications 77:23, pages 30403-30418.
Crossref
Yan-Xiao Liu, Ching-Nung Yang, Yung-Shun Chou, Song-Yu Wu & Qin-Dong Sun. (2018) Progressive secret image sharing Scheme with meaningful shadow images by GEMD and RGEMD . Journal of Visual Communication and Image Representation 55, pages 766-777.
Crossref
Chin-Feng Lee, Chin-Cheng Chang, Xiaozhu Xie, Ke Mao & Run-Hua Shi. (2018) An adaptive high-fidelity steganographic scheme using edge detection and hybrid hamming codes. Displays 53, pages 30-39.
Crossref
Gyan Singh Yadav & Aparajita Ojha. (2018) Chaotic system-based secure data hiding scheme with high embedding capacity. Computers & Electrical Engineering 69, pages 447-460.
Crossref
Yi-Chun Weng, Wen-Chung Kuo, Chun-Cheng Wang & Yu-Chih Huang. (2018) A novel new idea of data hiding using GEMD technique. A novel new idea of data hiding using GEMD technique.
Chun-Cheng Wang, Wen-Chung Kuo, Yu-Chih Huang & Lih-Chyau Wuu. (2017) A high capacity data hiding scheme based on re-adjusted GEMD. Multimedia Tools and Applications 77:5, pages 6327-6341.
Crossref
Yanjun Liu, Chin-Chen Chang, Peng-Cheng Huang & Cheng-Yi Hsu. (2018) Efficient Information Hiding Based on Theory of Numbers. Symmetry 10:1, pages 19.
Crossref
Yanxiao Liu, Chingnung Yang & Qindong Sun. (2018) Enhance Embedding Capacity of Generalized Exploiting Modification Directions in Data Hiding. IEEE Access 6, pages 5374-5378.
Crossref
Shuchi Agarwal & Jaipal Singh Bisht. (2017) Improved BEMD data hiding scheme: Data hiding binary exploitation modification direction scheme using image steganography. Improved BEMD data hiding scheme: Data hiding binary exploitation modification direction scheme using image steganography.
Wei-Sung Chen, Kuo-Chen Wu & Chung-Ming Wang. (2017) A novel message embedding algorithm using the optimal weighted modulus. Information Sciences 388-389, pages 17-36.
Crossref
Wen-Chung Kuo, Sheng-Yi Chang, Chun-Cheng Wang & Chin-Chen Chang. (2016) Secure multi-group data hiding based on gemd map. Multimedia Tools and Applications 76:2, pages 1901-1919.
Crossref
Wen-Chung Kuo, Jyun-Jia Li, Chun-Cheng Wang, Lih-Chyau Wuu & Yu-Chih Huang. (2016) An Improvement Data Hiding Scheme Based on Formula Fully Exploiting Modification Directions and Pixel Value Differencing Method. An Improvement Data Hiding Scheme Based on Formula Fully Exploiting Modification Directions and Pixel Value Differencing Method.
Wen-Chung Kuo, Chun-Cheng Wang & Hong-Ching Hou. (2016) Signed digit data hiding scheme. Information Processing Letters 116:2, pages 183-191.
Crossref
Wen-Chung Kuo, Shao-Hung Kuo, Chun-Cheng Wang & Lih-Chyau Wuu. (2016) High capacity data hiding scheme based on multi-bit encoding function. Optik 127:4, pages 1762-1769.
Crossref
Wen-Chung Kuo, Shao-Hung Kuo & Lih-Chyau Wuu. (2015) Multi-Bit Data Hiding Scheme for Compressing Secret Messages. Applied Sciences 5:4, pages 1033-1049.
Crossref
Wen-Chung Kuo, Chun-Cheng Wang & Yu-Chih Huang. (2015) Binary power data hiding scheme. AEU - International Journal of Electronics and Communications 69:11, pages 1574-1581.
Crossref
Wen-Chung Kuo, Chun-Cheng Wang, Hong-Ching Hou & Chen-Tsun Chuang. 2015. Digital-Forensics and Watermarking. Digital-Forensics and Watermarking 266 275 .
Yu-Chih Huang, Wen-Chung Kuo & Ching-Nung Yang. (2014) Data Hiding Based on Radix-2. Data Hiding Based on Radix-2.
Chin Chen Chang & Hsiao Ling Wu. (2014) A Large Payload Information Hiding Scheme Using Two-Level Exploiting Modification Direction. A Large Payload Information Hiding Scheme Using Two-Level Exploiting Modification Direction.
Wen-Chung KUO & Ming-Chih KAO. (2013) A Steganographic Scheme Based on Formula Fully Exploiting Modification Directions. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E96.A:11, pages 2235-2243.
Crossref
Wen-Chung Kuo. 2013. Advances in Intelligent Systems and Applications - Volume 2. Advances in Intelligent Systems and Applications - Volume 2 131 139 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.