67
Views
5
CrossRef citations to date
0
Altmetric
Articles

Secured steganographic scheme for highly compressed color image using weighted matrix through DCT

, ORCID Icon & ORCID Icon
Pages 38-49 | Received 04 Apr 2018, Accepted 18 Jul 2018, Published online: 05 Aug 2018

References

  • Good WF, Maitz GS, Gur D. Joint photographic experts group (JPEG) compatible data compression of mammograms. J Digit Imaging. 1994;7(3):123.
  • Kang X, Yang R, Huang J. Geometric invariant audio watermarking based on an LCM feature. IEEE Trans Multimedia. 2011;13(2):181–190.
  • Preda RO. Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain. Measurement. 2013;46(1):367–373.
  • Rahman SMM, Ahmad MO, Swamy MNS. A new statistical detector for DWT-based additive image watermarking using the Gauss Hermite expansion. IEEE Trans Image Process. 2009;18(8):1782–1796.
  • Wang S, Zheng D, Zhao J, et al. Adaptive watermarking and tree structure based image quality estimation. IEEE Trans Multimedia. 2014;16(2):311–325.
  • Zhang X, Qian Z, Ren Y, et al. Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans Inf Forensics Sec. 2011;6(4):1223–1232.
  • Cheng CJ, Hwang WJ, Zeng HY, et al. A fragile watermarking algorithm for hologram authentication. J Display Technol. 2014;10(4):263–271.
  • Upham D. JPEG-JSteg. 1997 [cited 2018 Feb 4]. Available from: http://www.funet.fi/pub/crypt/steganography/jpeg-jsteg-v4.diff.gz
  • Westfeld A. F5a steganographic algorithm. International workshop on information hiding; Berlin, Heidelberg: Springer; 2001. p. 289–302.
  • Fridrich J, Goljan M, Du R. Invertible authentication watermark for JPEG images. International Conference on Information Technology: Coding and Computing, 2001. Proceedings; IEEE; 2001. p. 223–227.
  • Chang CC, Chen TS, Chung LZ. A steganographic method based upon JPEG and quantization table modification. Inf Sci (Ny). 2002;141(12):123–138.
  • Iwata M, Miyake K, Shiozaki A. Digital steganography utilizing features of JPEG images. IEICE Trans Fund Elect Commu Comput Sci. 2004;87(4):929–936.
  • Chang CC, Lin CC, Tseng CS, et al. Reversible hiding in DCT-based compressed images. Inf Sci (Ny). 2007;177(13):2768–2786.
  • Xuan G, Shi YQ, Ni Z, et al. Reversible data hiding for JPEG images based on histogram pairs. International Conference Image Analysis and Recognition; Berlin, Heidelberg: Springer; 2007. p. 715–727.
  • Sakai H, Kuribayashi M, Morii M. Adaptive reversible data hiding for JPEG images. Information Theory and Its Applications, 2008. International Symposium on ISITA 2008. IEEE; 2008. p. 1–6.
  • Cheng Z, Yoo KY. A reversible JPEG-to-JPEG data hiding technique. 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC), IEEE; 2009. p. 635–638.
  • Zhang X, Wang S, Qian Z, et al. Reversible fragile watermarking for locating tampered blocks in JPEG images. Signal Processing. 2010;90(12):3026–3036.
  • Wang K, Lu ZM, Hu YJ. A high capacity lossless data hiding scheme for JPEG images. J Syst Softw. 2013;86(7):1965–1975.
  • Thai TH, Cogranne R, Retraint F. Statistical model of quantized DCT coefficients: application in the steganalysis of Jsteg algorithm. IEEE Trans Image Process. 2014;23(5):1980–1993.
  • Singh D, Singh SK. DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimed Tools Appl. 2017;76(1):953–977.
  • Saidi M., Hermassi H., Rhouma R., et al. A new adaptive image steganography scheme based on DCT and chaotic map. Multimed Tools Appl. 2017;76(11):13493–13510.
  • Tavoli R, Kozegar E, Shojafar M, et al. Weighted PCA for improving Document Image Retrieval System based on keyword spotting accuracy. 2013 36th International Conference on Telecommunications and Signal Processing (TSP), IEEE; 2013. p. 773–777.
  • Tseng YC, Chen YY, Pan HK. A secure data hiding scheme for binary images. IEEE Trans Commun. 2002;50(8):1227–1231.
  • Fan L, Gao T, Cao Y. Improving the embedding efficiency of weight matrix-based steganography for grayscale images. Comput Elect Eng. 2013;39(3):873–881.
  • Jana B. High payload reversible data hiding scheme using weighted matrix. Optik Int J Light Elect Opt. 2016;127(6):3347–3358.
  • University of Southern California, The USC-SIPI Image Database; [cited 2018 Feb 3]. Available from: http://sipi.usc.edu/database/database.php
  • Nottingham Trent University, UK, UCID Image Database; [cited 2018 Feb 3]. Available from: http://jasoncantarella.com/downloads/ucid.v2.tar.gz
  • Lin CC, Shiu PF. High capacity data hiding scheme for dct-based images. J Inf Hiding Multimed Signal Process. 2010;220–240.
  • Wei S, Zhe-Ming L, Yu-Chun W, et al. High performance reversible data hiding for block truncation coding compressed images. Signal Image Video Process. 2013;7(2):297–306.
  • Biswapati J, Debasis G, Kumar MS. Weighted matrix based reversible data hiding scheme using image interpolation. Computational Intelligence in Data Mining; Vol. 2. New Delhi: Springer; 2016. p. 239–248.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.