IEEE Transactions on Computers
A steganographic method for images by pixel-value differencing
Pattern Recognition Letters
Secret image sharing with steganography and authentication
Journal of Systems and Software
Reliable detection of LSB steganography in color and grayscale images
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
Technical section: Steganography on point-sampled geometry
Computers and Graphics
Data hiding in binary image for authentication and annotation
IEEE Transactions on Multimedia
Steganalytic Measures for the Steganography Using Pixel-Value Differencing and Modulus Function
PCM '08 Proceedings of the 9th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Reversible data hiding for high quality images using modification of prediction errors
Journal of Systems and Software
A novel data hiding scheme based on modulus function
Journal of Systems and Software
A novel adaptive steganography based on local complexity and human vision sensitivity
Journal of Systems and Software
An improved section-wise exploiting modification direction method
Signal Processing
An encoding method for both image compression and data lossless information hiding
Journal of Systems and Software
Journal of Visual Communication and Image Representation
Improved steganographic method preserving pixel-value differencing histogram with modulus function
EURASIP Journal on Advances in Signal Processing
A data hiding scheme using the varieties of pixel-value differencing in multimedia images
Journal of Systems and Software
An information hiding scheme with minimal image distortion
Computer Standards & Interfaces
Image data hiding schemes based on graph coloring
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
A high quality image sharing with steganography and adaptive authentication scheme
Journal of Systems and Software
Exploring pixel-value differencing and base decomposition for low distortion data embedding
Applied Soft Computing
A technique of embedding digital data in an image compression code reversibly
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
Information Sciences: an International Journal
Journal of Systems and Software
An intelligent chaotic embedding approach to enhance stego-image quality
Information Sciences: an International Journal
A novel technique for image steganography based on a high payload method and edge detection
Expert Systems with Applications: An International Journal
A Novel Steganographic Method with Four-Pixel Differencing and Modulus Function
Fundamenta Informaticae
Human visual system based data embedding method using quadtree partitioning
Image Communication
Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique
Information Sciences: an International Journal
A reversible data hiding method by histogram shifting in high quality medical images
Journal of Systems and Software
Using PSO in a spatial domain based image hiding scheme with distortion tolerance
Computers and Electrical Engineering
Hi-index | 0.00 |
In this paper, we shall propose a new image steganographic technique capable of producing a secret-embedded image that is totally indistinguishable from the original image by the human eye. In addition, our new method avoids the falling-off-boundary problem by using pixel-value differencing and the modulus function. First, we derive a difference value from two consecutive pixels by utilizing the pixel-value differencing technique (PVD). The hiding capacity of the two consecutive pixels depends on the difference value. In other words, the smoother area is, the less secret data can be hidden; on the contrary, the more edges an area has, the more secret data can be embedded. This way, the stego-image quality degradation is more imperceptible to the human eye. Second, the remainder of the two consecutive pixels can be computed by using the modulus operation, and then secret data can be embedded into the two pixels by modifying their remainder. In our scheme, there is an optimal approach to alter the remainder so as to greatly reduce the image distortion caused by the hiding of the secret data. The values of the two consecutive pixels are scarcely changed after the embedding of the secret message by the proposed optimal alteration algorithm. Experimental results have also demonstrated that the proposed scheme is secure against the RS detection attack.