30
Views
17
CrossRef citations to date
0
Altmetric
Articles

High-capacity steganographic method based on pixel-value differencing and LSB replacement methods

Pages 213-221 | Published online: 18 Jul 2013

REFERENCES

  • Johnson, N. E. and Jajodia, S. Exploring steganogra- phy: seeing the unseen. Comput. Pract., 1998, 31, 26–34.
  • Zollner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G. and Wolf, G. Modeling the security of steganographic systems. Lect. Notes Comput. Sci., 1998, 1525, 345–355.
  • Wu, D. C. and Tsai, W. H. A steganographic method for images by pixel-value differencing. Patt. Recogn. Lett, 2003, 24, 1613–1626.
  • Wu, H. C., Wu, N. I., Tsai, C. S. and Hwang, M. S. Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proc., Visual Image Signal Process., 2005, 152, 611–615.
  • Wang, C. M., Wu, N. I., Tsai, C. S. and Hwang, M. S. A high quality steganographic method with pixel-value differencing and modulus function. J. Syst. Software, 2008, 81, 150–158.
  • Chan, C. K. and Cheng, L. M. Hiding data in images by simple LSB substitution. Patt. Recogn., 2004, 37, 469–474.
  • Chang, C. C., Lin, M. H. and Hu, Y. C. A fast and secure image hiding scheme based on LSB substitution. Int. J. Patt. Recogn. Artif. Intell., 2002, 16, 399–416.
  • Wang, R. Z., Lin, C. F. and Lin, J. C. Image hiding by optimal LSB substitution and genetic algorithm. Patt. Recogn., 2001, 34, 671–683.
  • Thien, C. C. and Lin, J. C. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Patt. Recogn., 2003, 36, 2876–2881.
  • Tseng, H. W. and Hsieh, C. P. Reversible data hiding based on image histogram modification. Imag. Sci.iJ., 2008, 56, 271–278.
  • Gonzalez, R. C. and Woods, R. E. Digital Image Processing, 2002 (Prentice Hall, Upper Saddle River, NJ).
  • Anderson, R. J. and Petitcolas, F. A. P. On the limits of steganography. IEEE J. Selected Areas Commun., 1998, 16, 474–481.
  • Hsiao, J. Y. and Chang, C. T. Steganographic scheme for digital images using difference in neighbouring pixels. Imag. Sci.iJ., 2008, 56, 291–299.
  • Wang, Z. A universal image quality index. IEEE Signal Process. Lett., 2002, 9, 81–84.
  • Lin, C. N., Chang, C. C. and Chan, Y. K. Data hiding on two stage VQ compression codes. Imag. Sci.iJ., 2008, 56, 342–350.
  • Wang, R. Z. and Su, C. H. Secret image sharing with smaller shadow images. Patt. Recogn. Lett., 2005, 27, 551–555.
  • Petitcolas, F. A. P., Anderson, R. J. and Kuhn, M. G. Information hiding – a survey. Proc. IEEE, 1999, 87, 1062–1078.
  • Shie, S. C., Lin, S. D. and Jiang, J. H. Image steganographic scheme using predictive side match vector quantisation. Imag. Sci. J., 2008, 56, 123–135.
  • Liu, J. C. and Shih, M. H. Generalizations of pixel-value differencing steganography for data hiding in images. Fundam. Inform., 2008, 83, 319–335.
  • Liaoa, K. C., Leea, W. B. and Liaob, C. W. Security of fragile watermarking scheme for image authentication. Imag. Sci. J, 2006, 54, 129–133.
  • Lin, I. C., Lin, Y. B. and Wang, C. M. Hiding data in spatial domain images with distortion tolerance. Comput. Stand. Interf., 2009, 31, 458–464.
  • Lee, I. S. and Tsai, W. H. Data hiding in grayscale images by dynamic programming based on a human visual model. Patt. Recogn., 2009, 42, 1604–1611.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.