9
Views
1
CrossRef citations to date
0
Altmetric
Articles

A chaotic mapbased adaptive variable-size LSB method with pixel-value differencing and modulus function

&
Pages 49-60 | Published online: 18 Jul 2013

REFERENCES

  • Diffie, W. and Hellman, M .E. New directions in cryptography. 2, 1976, IT-22, 644–654.
  • Diffie, W. and Hellman, M. E. Privacy and authentication: an Introduction to cryptography. Proc. IEEE, 1979, 67, 397–427.
  • Rivest, R., Shamir, A. and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 1978, 21, 120–126.
  • Chang, C. C., Hsiao, J. Y. and Chan, C. S. Finding optimal least-significant-bits substitution in image hiding by dynamic programming strategy. Patt. Recogn., 2003, 36, 1583–1595.
  • Hsieh, Y. P., Chang, C. C. and Liu, L. J. A two-codebook combination and three-phase block matching based image hiding scheme with high embedding-capacity. Patt. Recogn., 2008, 41, 3104–3113.
  • Wu, D. C. and Tsai, W. H. A steganographic method for images by pixel-value differencing. Patt. Recogn. Lett., 2003, 24, 1613–1626.
  • Yang, C. H., Weng, C. Y., Wang, S. J. and Sun, H. M. Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. Inform. Forensics Secur., 2008, 3, 488–497.
  • Chan, C. K. and Cheng, L. M. Hiding data in images by simple LSB substitution. Patt. Recogn., 2004, 37, 496–474.
  • Chang, C. C., Hsieh, Y. P. and Lin, C. H. Sharing secrets in stego images with authentication. Patt. Recogn., 2008, 41, 3130–3137.
  • Wang, R. Z., Lin, C. F. and Lin, J. C. Image hiding by optimal LSB substitution and genetic algorithm. Patt. Recogn., 2001, 34, 671–683.
  • Chang, C. C., Chan, C. S. and Fan, Y. H. Image hiding scheme with modulus function and dynamic programming. Patt. Recogn., 2006, 39, 1155–1167.
  • Thien, C. C. and Lin, J. C. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Patt. Recogn., 2003, 36, 2875–2881.
  • Wang, S. J. Steganography of capacity required using modulo operator for embedding secret image. Appl. Math. Comput., 2005, 164, 99–116.
  • Wu, H. C., Wu, N. I., Tsai, C. S. and Hwang, M. S. Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proc. Vision Image Signal Process., 2005, 152, 611–615.
  • Voyatzis, G. and Pitas, I. Applications of toral automorphisms in image watermarking, Proc. IEEE Conf. on Image processing, Lausanne, Switzerland, September 1996, IEEE, Vol. 1, pp. 237–240.
  • Fridrich, J., Goljan, M. and Du, R. Reliable detection of LSB steganography in color and grayscale images, Proc. ACM Workshop on Multimedia and security, Ottawa, Ont., Canada, October 2001, ACM, pp. 27–30.
  • Fridrich, J., Goljan, M. and Du, R. Detecting LSB steganography in color and gray-scale images. IEEE Multimedia, 2001, 8, 22–28.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.