116
Views
1
CrossRef citations to date
0
Altmetric
Part 2: Computational Intelligence and Communications

Enhanced Position Power First Mapping (PPFM) based image steganography

&
Pages 59-68 | Received 05 Jan 2016, Accepted 10 Dec 2016, Published online: 02 Jan 2017

References

  • Bhattacharyya S, Sanyal G. Hiding data in images using Pixel Mapping Method (PMM). Security and management; Las Vegas, NV: CSREA Press; 2010. p. 683–689.
  • Chandramouli R, Kharrazi M, Memon N. Image steganography and steganalysis concepts and practice. In: Kalker T, Cox IJ, Ro YM, editors. IWDW; Berlin: Springer Verlag; 2003. p. 35–49.
  • Anderson R, Petitcolas F. On the limits of steganography. IEEE J Sel Area Commun. 1998;16:474–481.
  • Solanki K, Jacobsen N, Chandrasekaran S, et al. High-volume data hiding in images: introducing perceptual criteria into quantization based embedding. Proceedings of ICASSP; 2002 May; Orlando, FL; Vol. 4; p. 3485–3488.
  • Wei D, Weiqi Y, Dongxu Q. Digital image scrambling technology based on Arnold transformation. J Comp Aided Des Comp Graphics. 2001;13:339–341.
  • Simmons GJ. The prisoners’ problem and the subliminal channel. In: Advances in CryptologyCRYPTO~’83’. New York: Springer Plenum; 1984. p. 51–67.
  • Mukherjee S, Ash S, Sanyal G. A novel image steganographic approach by Pixel Position Modulus Method (PPMM). Computing for Sustainable Global Development (INDIACom). Second International Conference on Year-2015 IEEE Conference Publications, New Delhi; 2015.
  • Morkel T, Eloff JHP, Olivier MS. An overview of image steganography. Pretoria: ISSA; 2005. p. 1–11.
  • Mukherjee S, Sanyal G. A novel image steganographic technique using Position Power First Mapping (PPFM). IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), Kolkata; 2015; p. 406–410.
  • Shang Z, Ren H, Zhang J. A block location scrambling algorithm of digital image based on Arnold transformation. In: ICYCS. Washington, DC: IEEE Computer Society; 2008. p. 2942–2947.10.1109/ICYCS.2008.99
  • Provos N, Honeyman P. Hide and seek: an introduction to steganography. Washington, DC: IEEE Computer Society; 2003.
  • Ash S, Mukherjee S, Sanyal G. A DWT based steganographic method using Prime First Mapping (PFM). Advances in Computing and Communicational Engineering. ICACCE; Dehradun, India; 2015; p. 471–476.
  • Fridrich J, Goljan M, Du R. Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia. 2001;8:22–28.10.1109/93.959097
  • Vijayalakshmi V, Zayaraz G, Nagaraj V. A modulo based LSB steganography method. In: International Conference on Control, Automation, Communication and Energy Conservation; Tamil Nadu, India; 2009 Jun 4–6; p. 1–4.
  • Long B, Bo H. An improved steganographic method by pixel value differencing. J Circuit Syst. 2006;11:9–13.
  • Chung-Ming W, Nan-i W, Chwei-shyong T. A high quality steganographic method with pixel value differencing and modulus function. J Syst Softw. 2008;81:150–158.
  • Huang P, Chang K, Chang C, et al A novel image steganography method using tri-way pixel value differencing. J Multimedia. 2008;3:37–44.
  • Potdar V, Chang E. Gray level modification steganography for secret communication. In: IEEE International Conference on Industrial Informatics; Berlin, Germany; 2004; p. 355–368.
  • Ahmad T, Abdullah M. A novel steganographic method for gray-level images. Int J Comp Inf Syst Sci Eng. 2009;3:574–579.
  • Bhattacharyya S, Khan A, Nandi A, et al Pixel Mapping Method (PMM) Based Bit Plane Complexity Segmentation (BPCS) steganography. In: WICT (World Congress on Information and Communication Technologies); Mumbai, India; 2011.
  • Lan T, Mansour M, Tewfik A. Robust high capacity data embedding. In: ICIP; 2000; Vancouver, BC, Canada; p. 581–584.
  • Kanan H, Nazeri B. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl. 2014;41:6123–6130.10.1016/j.eswa.2014.04.022
  • Almohammad A, Ghinea G. Stego-image quality and the reliability of PSNR. Image Processing Theory, Tools and Applications, IEEE ;University Evry Paris, France; 2010.10.1109/IPTA.2010.5586786
  • Bhattacharyya S, Sanyal G. Study and analysis of quality of service in different image based steganography using Pixel Mapping Method. Int J Appl Inf Syst (UAIS). 2012;2:42–57.
  • Hemalatha S, Acharya U, Renuka A, et al. A secure and high capacity image steganography technique. 2013; 4, CoRRabs 1304.3629:83–89.
  • Sai N, Patil R. Image retrieval using equalized histogram image bins moments. Int J Signal Image Proc. 2011;2:9–12.
  • Verhulp E, Rietbergen B, Huiskes R. A three-dimensional digital image correlation technique for strain measurements in microstructures. J Biomechan. 2004;37:1313–1320.10.1016/j.jbiomech.2003.12.036
  • Lundin R, Lindskog S. An investigation of entropy of selectively encrypted bitmap images. In: CASoN, IEEE; Sao Carlos, Brazil; 2012. p. 238–243.10.1109/CASoN.2012.6412409
  • Franz E. Steganography preserving statistical properties. 5th International Working Conference on Communication and Multimedia Security; London: Springer-Verlag; 2002.
  • Ding M, Jing F. Digital image encryption algorithm based on improved Arnold transform. Int Forum Inf Technol Appl. 2010;1:174–176.
  • Cachin C. An Information-Theoretic Model for Steganography. IACR Cryptology. ePrintArchive. 2000; p. 28.
  • Eggers J, Bauml R, Girod B. A communications approach to image steganography. Proceedings of SPIE; San Jose, CA; 2002.
  • Abdelfatah A, Tamimi A, Abdalla M. Hiding an Image inside another Image using Variable-Rate Steganography. Int J Adv Comp Sci Appl (IJACSA). 2013;4:18–21.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.