4
Views
1
CrossRef citations to date
0
Altmetric
Articles

An authenticated secure image hiding scheme

Pages 109-117 | Published online: 20 Nov 2013

REFERENCES

  • Anderson, R. J. and Petitcolas, F. A. P. On the limits of steganography. IEEE J. Selected Areas Commun., 1998, 16, 474–481.
  • Amin, M. M., Salleh, M., Ibrahim, S., Katmin, M. R. and Shamsuddin, M. Z. I. Information hiding using steganography, Proc. 4th IEEE Natl Conf. on Telecommunication technology, Shah Alam, Malaysia, January 2003, IEEE, pp. 21–25.
  • Bender, W., Gruhl, D., Morimoto, N. and Lu, A. Techniques for data hiding. IBM Syst. J., 1996, 35, 313–335.
  • Chang, C. C., Chen, T. S. and Chung, L. Z. A steganographic method based upon JPEG and quantization table modification. Inform. Sci., 2002, 141, 123–138.
  • Chang, C. C., Hsiao, J. Y. and Chan, C. S. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Patt. Recogn., 2003, 36, 1583–1595.
  • Chang, C. C., Yeh, J. C. and Hsiao, J. Y. A novel scheme for securing image steganography, Proc. 2nd IEEE Pacific Rim Conf. on Multimedia: advances in multimedia information processing, Beijing, China, October 2001, IEEE, pp. 804–811.
  • Chan, C. and Cheng, L. M. Hiding data in images by simple LSB substitution. Patt. Recogn., 2004, 37, 469–474.
  • Chan, Y. K. and Chang, C. C. Concealing a secret image using the breadth first traversal linear quadtree structure, Proc. 3rd IEEE Int. Symp. on Cooperative database systems for advanced applications, Beijing, China, April 2001, IEEE, pp. 194–199.
  • Chen, T. S., Chang, C. C. and Hwang, M. S. A virtual image cryptosystem based upon vector quantization. IEEE Trans. Image Process., 1998, 7, 1485–1488.
  • Gray, R. Vector quantization. IEEE ASSP Mag., 1984, 1, 4–29.
  • Hu, Y. C. Grey-level image hiding scheme based on vector quantization. Electron. Lett., 2003, 39, 202–203.
  • Lee, Y. K. and Chen, L. H. High capacity image steganographic model. Proc. IEE Vision Image Signal Process., 2000, 147, 288–294.
  • Linde, Y., Buzo, A. and Gray, R. M. An algorithm for vector quantizer design. IEEE Trans. Commun., 1980, 28, 84–95.
  • Lou, D. C. and Liu, J. L. Steganographic method for secure communications. Comput. Secur., 2002, 21, 449–460.
  • Maurer, U. Towards the equivalence of breaking the Diffie–Hellman protocol and computing discrete logarithms. Lect. Notes Comput. Sci., 1994, 839, 271–281.
  • Pan, H. K., Chen, Y. Y. and Tseng, Y. C. A secure data hiding scheme for two-color images, Proc. 5th IEEE Symp. on Computers and communications, Antibes, France, July 2000, IEEE Computer Society, pp. 750–755.
  • Petitcolas, F. A. P., Anderson, R. J. and Kuhn, M. G. Information hiding — a survey. Proc. IEEE, 1999, 87, 1062–1078.
  • Su, P. C. and Kuo, C. C. J. Steganography in JPEG2000 compressed images. IEEE Trans. Consum. Electron., 2003, 49, 824–832.
  • Thien, C. C. and Lin, J. C. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Patt. Recogn., 2003, 36, 2875–2881.
  • Wang, R. Z., Lin, C. F. and Lin, J. C. Image hiding by optimal LSB substitution and genetic algorithm. Patt. Recogn., 2001, 34, 671–683.
  • Wu, D. C. and Tsai, W. H. Spatial-domain image hiding using image differencing. IEE Image Signal Process., 2000, 147, 29–37.
  • National Institute of Standards and Technology. NIST FIPS PUB 186: Digital Signature Algorithm, 1994 (US Department of Commerce, Washington, DC).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.