93
Views
14
CrossRef citations to date
0
Altmetric
Research papers

Dual image based reversible data hiding method using neighbouring pixel value differencing

Pages 398-407 | Received 09 Feb 2015, Accepted 21 May 2015, Published online: 12 Jun 2015

References

  • Hsiao, J. Y., Chan, K. F. and Chang, J. M. Block-based reversible data embedding. Signal Process., 2009, 89, 556–569.
  • Khodaei, M. and Faez, K. New adaptive steganographic method using least-significant-bit substationand pixel-value differencing. IET Image Process., 2012, 6/5, 677–686.
  • Mielikainen, J. LSB matching revisited. IEEE Signal Process. Lett., 2006, 13, 285–287.
  • Ker, A. Steganalysis of LSB matching in grayscale images. IEEE Signal Process. Lett., 2005, 12, 441–444.
  • Mielikainen, J. LSB matching revisited. IEEE Signal Process. Lett., 2006, 13, 285–287.
  • Chan, C. K. and Cheng, L. M. Hiding data in images by simple LSB substitution. Pattern Recognit., 2004, 37, 469–474.
  • Chang, C. C., Lin, M. H. and Hu, Y. C. A fast and secure image hiding scheme based on LSB substitution. Int. J. Pattern Recognit., 2002, 16, 399–416.
  • Wang, R. Z., Lin, C. F. and Lin, J. C. Image hiding by optimal LSB substitution and geneticalgorithm. Pattern Recognit., 2001, 34, 671–683.
  • Wu, D. C. and Tsai, W. H. A steganographic method for images by pixel-value differencing. Pattern Recognit. Lett., 2003, 24, 1613–1626.
  • Liao, X., Wen, Q. Y. and Zhang, J. A steganographic method for digital images with four-pixel differencing and modified LSB substitution. J. Visual Commun. Image Represent., 2011, 22/1, 1–8.
  • Wu, N. I., Wu, K. C. and Wang, C. M. Exploring pixel-value differencing and base decomposition for low distortion data embedding. Appl. Soft Comput., 2002, 12, 942–960.
  • Yang, C. H., Weng, C. Y., Wang, S. J. and Sun, H. M. Adaptive data hiding in edge areas of images with spatial LSB domain systems, Information Forensics and Security. IEEE Transactions, 2008, 3/3, pp. 488–497.
  • Chang, K. C., Huang, P. S., Tu, T. M. and Chang, C. P. Adaptive image steganographic scheme based on tri-way pixel-value differencing., Proc. IEEE Int. Conf. on Systems, man and cybernetics, Montreal, Que., Canada 2007 (IEEE, pp. 1165–1170.
  • Lee, Y. P., Lee, J. C., Chen, W. K., Chang, K. C., Su, I. J. and Chang, C. P. High-payload image hiding with quality recovery using tri-way pixel-value differencing. Information Sciences, 2012, 191/15, 214–225.
  • Wang, C. M., Wu, N. I., Tsai, C. S. and Hwang, M. S. A high quality steganographic method with pixel-value differencing and modulus function. J. Syst. Software, 2008, 81, 150–158.
  • Wu, H. C., Wu, N. I., Tsai, C. S. and Hwang, M. S. Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Process. Visual. Image Signal Process, 2005, 152, 611–615.
  • Chang, K. C., Huang, P. S., Tu, T. M. and Chang, C. P. Image steganographic scheme using tri-way pixel-value differencing and adaptive rules. Intell. Inf. Hiding Multimedia Signal Process., 2007, 3rd International Conference on (volume 2), 2, 449–452.
  • Tian, J. Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol., 2003, 13/8, 890–896.
  • Alattar, A. M. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Process., 2004, 13/8, 1147–1156.
  • Al-Oershi, O. M. and Khoo, B. E. Two-dimensional difference expansion (2D-DE) scheme with a characteristics-based threshold. Signal Process., 2013, 93, 154–162.
  • Ni, Z., Shi, Y. Q., Ansari, N. and Su, W. Reversible data hiding., Proc. Int. Symp. on Circuits and systems, Bangkok, Thailand, IEEE May 2003, Vol. 2, pp. 912–915.
  • Luo, H., Yu, F. X., Chen, H., Huang, Z. L., Li, H. and Wang, P. H. Reversible data hiding based on block median preservation. Inf. Sci., 2011, 181, 308–328.
  • Zhao, Z., Luo, H., Lu, Z. M. and Pan, J. S. Reversible data hiding based on multilevel histogram modification and sequential recovery. AEU-Int. J. Electron. Commun., 2011, 65/10, 814–826.
  • Huang, L. C., Tseng, L. Y. and Hwang, M. S. A reversible data hiding method by histogram shifting in high quality medical images. J. Syst. Software, 2013, 86, 716–727.
  • Thodi, D. M. and Rodriguez, J. J. Expansion embedding techniques forreversible watermarking. IEEE Trans. Image Process., 2007, 16/3, 721–730.
  • Hu, Y., Lee, H. K. and Li, J. DE-based reversible data hiding with improved overflow location map. IEEE Trans. Circuits Syst. Video Technol., 2009, 19/2, 250–260.
  • Li, X., Yang, B. and Zeng, T. Efficient reversible data watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans. Image Process., 2011, 20/12, 3524–3533.
  • Lee, C. F. and Chen, H. C. Adjustable prediction-based reversible data hiding. Digital Signal Process., 2012, 22/6, 941–953.
  • Li, X., Li, J., Li, B. and Yang, B. High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process., 2013, 93, 198–205.
  • Lee, C. F. and Huang, Y. L. Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun. Syst., 2013, 52/4, 2237–2247.
  • Qin, C., Chang, C. C. and Hsu, T. J. Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimedia Tools Appl., 2014, 1–12, DOI 10.1007/s11042-014-1894-5.
  • Lu, T. C., Tseng, C. Y. and Wu, J. H. Dual imaging-based reversible hiding technique using LSB matching. Signal Process., 2015, 108, 77–89.
  • Nissar, A. and Mir, A. H. Classification of steganalysis techniques: a study. Digital Signal Process., 2010, 20, 1758–1770.
  • Fridrich, J., Goljan, M. and Du, R. Detecting LSB steganography in color and gray-scale images. IEEE Multimedia, 2001, 8, 22–28.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.