93
Views
4
CrossRef citations to date
0
Altmetric
Research papers

A high payload hybrid data hiding scheme with LSB, EMD and MPE

, , &
Pages 174-181 | Received 11 Sep 2012, Accepted 28 Nov 2014, Published online: 12 Dec 2014

References

  • Chang CC and Hsieh YP. A chaotic mapbased adaptive variable-size LSB method with pixel-value differencing and modulus function. Imaging Sci. J., 2010, 58, 49–60.
  • Hong W, Chen TS and Shiu CW. Reversible data hiding for high quality images using modification of prediction errors. J. Syst. Software, 2009, 82, 1833–1842.
  • Jain AK and Uludag U. Hiding biometric data. IEEE Trans. Pattern Anal. Mach. Intell., 2003, 25, 1494–1498.
  • Lee S, Yoo CD and Kalker T. Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans. Inf. Forens. Secur., 2007, 2, 321–330.
  • Lin PL, Hsieh CK and Huang PW. A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn., 2005, 38, 2519–2529.
  • Mielikainen J. LSB matching revisited. IEEE Signal Process. Lett., 2006, 13, 285–287.
  • Ni Z, Shi YQ, Ansari N and Su W. Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol., 2006, 16, 354–362.
  • Pan CL, Hong W, Chen TS, Chen J and Shiu CW. Multilevel reversible data hiding using modification of prediction errors. Int. J. Innov. Comput. Inf. Control, 2011, 7, 5107–5118.
  • Provos N and Honeyman P. Hide and seek: an introduction to steganography. IEEE Secur. Privacy Mag., 2003, 1, 32–44.
  • Shen JJ and Wang CC. A robust information hiding scheme for tampered cover images. Imaging Sci. J., 2014, 62, 395–401.
  • Zhang X and Wang S. Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett., 2006, 10, 781–783.
  • Zhang X and Wang S. Steganography combining data decomposition mechanism and stego-coding method. Informatica, 2009, 33, 41–48.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.