11
Views
2
CrossRef citations to date
0
Altmetric
Articles

Steganographic scheme for digital images using difference in neighbouring pixels

Pages 291-299 | Published online: 18 Jul 2013

REFERENCES

  • Anderson, R. J. and Petitcolas, F. A. P. On the limits of steganography. IEEE J. Sel. Areas Commun., 1998, 16, 474–481.
  • Petitcolas, F. A. P., Anderson, R. J. and Kuhn, M. G. Information hiding – a survey. Proc. IEEE, special issue., 1999, 87, 1062–1078.
  • Abdulaziz, N. K. and Pang, K. K. Robust data hiding for images, Proc. Int. Cong. on Communication technology, WCC – ICCT 2000, Beijing, China, August 2000, Vol. 1, 380–383.
  • Lin, S. D. and Chen, C. F. A robust DCT-based watermarking for copyright protection, IEEE Trans. Consumer Electron., 2000, 46, 415–421.
  • Marvel, L. M., Boncelet, C. G. and Retter, C. T. Spread spectrum image steganography. IEEE Trans. Image Process., 1999, 8, 1075–1083.
  • Swanson, M. D., Zhu, B. and Tewfik, A. H. Robust data hiding for images, Proc. Int. Cong. on Digital Signal Processing, (ed. Norsig, L., Lerrik, J. M. and Waldemar P.), Loen, Norway, 1996, Vol. 1–4, 37–40.
  • Wang, S. H. and Lin, Y. P. Wavelet tree quantization for copyright protection watermarking, IEEE Trans. Image Process., 2004, 13, 154–165.
  • Chang, C. C. and Tseng, H. W. A steganographic method for digital images using side match. Pattern Recognit. Lett., 2004, 25, 1431–1437.
  • Wang, R. Z., Lin, C. F. and Lin, J. C. Hiding data in images by optimal moderately-significant-bit replacement. IEE Electron. Lett., 2000, 36, 2069–2070.
  • Wu, D. C. and Tsai, W. H. A steganographic method for images by pixel-value differencing. Pattern Recognit. Lett., 2003, 24, 1623–1636.
  • Bender, W., Gruhl, D., Morimoto, N. and Lu, A. Techniques for data hiding. IBM Syst. J., 1996, 35, 313–316.
  • Bender, W., Paiz, F. J., Butera, W., Pogreb, S., Gruhl, D. and Hwang, R. Applications for data hiding., IBM Syst. J., 2000, 39, 547–568.
  • Chan, C. K. and Cheng, L. M. Improved hiding data in images by optimal moderately-significant-bit replacement. IEE Electron. Lett., 2001, 37, 1017–1018.
  • Chan, C. K. and Cheng L. M. Hiding data in images by simple LSB substitution. Pattern Recognit., 2004, 37, 469–474.
  • Wang, R. Z., Lin, C. F. and Lin, J. C. Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognit., 2001, 34, 671–683.
  • Chang, C. C., Hsiao, J. Y. and Chan, C. S. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recogit., 2003, 36, 1583–1595.
  • Thien, C. C. and Lin, J. C. A sample and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognit., 2003, 36, 2875–2881.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.