18
Views
0
CrossRef citations to date
0
Altmetric
Original Research Paper

Data hiding using two-layer optimal approach

&
Pages 193-201 | Accepted 17 Sep 2010, Published online: 12 Nov 2013

REFERENCES

  • Wang RZ, Lin CF, Lin JC. Image hiding by optimal LSB substitution and genetic algorithm. Patt. Recogn., 2001, 34, 671–683.
  • Chang CC, Hsiao JY, Chan CS. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Patt. Recogn., 2003, 36, 1583–1595.
  • Celik MU, Sharma G, Tekalp AM. Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans. Image Process., 2006, 15, 1042–1049.
  • Wu DC, Tsai WH. A steganographic method for images by pixel-value differencing. Pattern Recogn. Lett., 2003, 24, 1613–1626.
  • Thien CC, Lin JC. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Patt. Recogn., 2003, 36, 2875–2881.
  • Chang YJ, Wang RZ, Lin JC. Hiding images using modified search order coding and modulus function. Int. J. Patt. Recogn. Artif. Intell., 2009, 22, 1215–1240.
  • Wu HC, Wu NI, Tsai CS, Hwang MS. Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proc. Vision Image Signal Process., 2005, 152, 611–615.
  • Yang CY, Lin JC. Image hiding by base-oriented algorithm. Opt. Eng., 2006, 45, 117001.
  • Shie SC, Lin SD. Secret image transmission based on VQ and data embedding. Int. J. Imag. Syst. Technol., 2007, 17, 1–9.
  • Hu YC, Lin CF, Lin JC. Grayscale image hiding scheme based on vector quantization. IEE Electron. Lett., 2003, 39, 202–203.
  • Chang CC, Chan CS, Fan YH. Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Patt. Recogn., 2006, 39, 1155–1167.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.