A steganographic method for images by pixel-value differencing
Pattern Recognition Letters
A new approach to reliable detection of LSB steganography in natural images
Signal Processing - Special section: Security of data hiding technologies
Image steganalysis with binary similarity measures
EURASIP Journal on Applied Signal Processing
A high quality steganographic method with pixel-value differencing and modulus function
Journal of Systems and Software
Steganalytic Measures for the Steganography Using Pixel-Value Differencing and Modulus Function
PCM '08 Proceedings of the 9th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Evaluation of Copyright Marking Systems
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
YASS: yet another steganographic scheme that resists blind steganalysis
IH'07 Proceedings of the 9th international conference on Information hiding
Steganalysis using higher-order image statistics
IEEE Transactions on Information Forensics and Security
Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems
IEEE Transactions on Information Forensics and Security
Journal of Systems and Software
Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique
Information Sciences: an International Journal
Hi-index | 0.00 |
We herein advance a secure steganographic algorithm that uses a turnover policy and a novel adjusting process. Although the method of Wang et al. uses Pixel-Value Differencing (PVD) and their modulus function provides high capacity and good image quality, the embedding process causes a number of artifacts, such as abnormal increases and fluctuations in the PVD histogram, which may reveal the existence of the hidden message. In order to enhance the security of the algorithm, a turnover policy is used that prevents abnormal increases in the histogram values and a novel adjusting process is devised to remove the fluctuations at the border of the subrange in the PVD histogram. The proposed method therefore eliminates all the weaknesses of the PVD steganographic methods thus far proposed and guarantees secure communication. In the experiments described herein, the proposed algorithm is compared with other PVD steganographic algorithms by using well-known steganalysis techniques, such as RS-analysis, steganalysis for LSB matching, and histogram-based attacks. The results support our contention that the proposed method enhances security by keeping the PVD histogram similar to the cover, while also providing high embedding capacity and good imperceptibility to the naked eye.