IBM Systems Journal
In business today and tomorrow
Communications of the ACM
Robust image watermarking in the spatial domain
Signal Processing
Digital Steganography: Hiding Data within Data
IEEE Internet Computing
Fractal Based Image Steganography
Proceedings of the First International Workshop on Information Hiding
Steganography Secure against Cover-Stego-Attacks
IH '99 Proceedings of the Third International Workshop on Information Hiding
Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
Secure Steganographic Methods for Palette Images
IH '99 Proceedings of the Third International Workshop on Information Hiding
Embedding a Seal into a Picture under Orthogonal Wavelet Transform
ICMCS '96 Proceedings of the 1996 International Conference on Multimedia Computing and Systems
Watermarking applications and their properties
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
Reliable detection of LSB steganography in color and grayscale images
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Image-adaptive watermarking using visual models
IEEE Journal on Selected Areas in Communications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Capacity estimates for data hiding in compressed images
IEEE Transactions on Image Processing
An iterative method of palette-based image steganography
Pattern Recognition Letters
Spatial domain image hiding scheme using pixel-values differencing
Fundamenta Informaticae
A copyright protection scheme for digital images using visual cryptography technique
Computer Standards & Interfaces
A novel data hiding scheme for color images using a BSP tree
Journal of Systems and Software
A high quality steganographic method with pixel-value differencing and modulus function
Journal of Systems and Software
High-Performance Reversible Data Hiding
Fundamenta Informaticae
Generalizations of Pixel-Value Differencing Steganography for Data Hiding in Images
Fundamenta Informaticae
High-performance JPEG steganography using complementary embedding strategy
Pattern Recognition
Sharing secrets in stego images with authentication
Pattern Recognition
A New Approach for Reducing Embedding Noise in Multiple Bit Plane Steganography
ICISP '08 Proceedings of the 3rd international conference on Image and Signal Processing
Textural features extraction for image integrity verification
International Journal of Electronic Security and Digital Forensics
The Hiding of Secret Data Using the Run Length Matching Method
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Steganalytic Measures for the Steganography Using Pixel-Value Differencing and Modulus Function
PCM '08 Proceedings of the 9th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Reversible Steganographic Method with High Payload for JPEG Images
IEICE - Transactions on Information and Systems
Proceedings of the International Conference on Advances in Computing, Communication and Control
Secret image sharing based on cellular automata and steganography
Pattern Recognition
Robust Watermarking in Slides of Presentations by Blank Space Coloring: A New Approach
Transactions on Data Hiding and Multimedia Security IV
A Statistical and Iterative Method for Data Hiding in Palette-Based Images
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
e-Forensics steganography system for secret information retrieval
Advanced Engineering Informatics
An enhannced technique for image steganography using 2-levels PVD
SIP '07 Proceedings of the Ninth IASTED International Conference on Signal and Image Processing
A novel watermarking scheme for image authentication in DWT domain
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
A new approach for data hiding in gray-level images
SPPRA '08 Proceedings of the Fifth IASTED International Conference on Signal Processing, Pattern Recognition and Applications
Secret communication via image hiding in image by pixel value differencing
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
A texture based image signature using second order statistics characterisation
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems - Volume Part I
Improving security of pixel value differencing steganographic method
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Tree Structure Based Data Hiding for Progressive Transmission Images
Fundamenta Informaticae
A novel adaptive steganography based on local complexity and human vision sensitivity
Journal of Systems and Software
Data hiding using run length matching
International Journal of Intelligent Information and Database Systems
Data hiding in images based on tolerable error range
ICICS'09 Proceedings of the 7th international conference on Information, communications and signal processing
An improved section-wise exploiting modification direction method
Signal Processing
Edge adaptive image steganography based on LSB matching revisited
IEEE Transactions on Information Forensics and Security
Adaptive image steganography with mod-4 embedding using image contrast
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
Tradeoff between energy savings and privacy protection in computation offloading
Proceedings of the 16th ACM/IEEE international symposium on Low power electronics and design
Varied PVD+LSB evading detection programs to spatial domain in data embedding systems
Journal of Systems and Software
An adaptive steganographic method based on the measurement of just noticeable distortion profile
Image and Vision Computing
Journal of Visual Communication and Image Representation
Improved steganographic method preserving pixel-value differencing histogram with modulus function
EURASIP Journal on Advances in Signal Processing
A data hiding scheme using the varieties of pixel-value differencing in multimedia images
Journal of Systems and Software
A steganographic scheme by fully exploiting modification directions
Expert Systems with Applications: An International Journal
A more secure steganography based on adaptive pixel-value differencing scheme
Multimedia Tools and Applications
An information hiding scheme with minimal image distortion
Computer Standards & Interfaces
Increased cover capacity using advanced multiple LSB algorithms
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
Varying radix numeral system based adaptive image steganography
Information Processing Letters
Adaptive reversible data hiding scheme based on integer transform
Signal Processing
Image data hiding schemes based on graph coloring
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
A progressive quality hiding strategy based on equivalence partitions of hiding units
Transactions on data hiding and multimedia security VI
Exploring pixel-value differencing and base decomposition for low distortion data embedding
Applied Soft Computing
An image steganography using pixel characteristics
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Data hiding in neural network prediction errors
ISNN'06 Proceedings of the Third international conference on Advances in Neural Networks - Volume Part III
Secret message location steganalysis based on local coherences of hue
PCM'05 Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II
A steganographic scheme in digital images using information of neighboring pixels
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part III
Journal of Systems and Software
High-payload image hiding with quality recovery using tri-way pixel-value differencing
Information Sciences: an International Journal
New image steganographic methods using run-length approach
Information Sciences: an International Journal
Multi bit plane image steganography
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Adaptive data hiding for images based on harr discrete wavelet transform
PSIVT'06 Proceedings of the First Pacific Rim conference on Advances in Image and Video Technology
Multimedia Tools and Applications
Block dependency feature based classification scheme for uncalibrated image steganalysis
ICDEM'10 Proceedings of the Second international conference on Data Engineering and Management
A novel technique for image steganography based on a high payload method and edge detection
Expert Systems with Applications: An International Journal
A hybrid embedded steganography technique: optimum pixel method and matrix embedding
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Reversible Steganography for BTC-compressed Images
Fundamenta Informaticae
High-Performance Reversible Data Hiding
Fundamenta Informaticae
Generalizations of Pixel-Value Differencing Steganography for Data Hiding in Images
Fundamenta Informaticae
Adaptively Embedding Binary Data in an Image
Fundamenta Informaticae
Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing
Fundamenta Informaticae
A Novel Steganographic Method with Four-Pixel Differencing and Modulus Function
Fundamenta Informaticae
Human visual system based data embedding method using quadtree partitioning
Image Communication
Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique
Information Sciences: an International Journal
Journal of Systems and Software
Data hiding method based on local image features
AMT'12 Proceedings of the 8th international conference on Active Media Technology
Securing Fingerprint Images Through PSO Based Robust Facial Watermarking
International Journal of Information Security and Privacy
An improvement of diamond encoding using characteristic value positioning and modulus function
Journal of Systems and Software
Using PSO in a spatial domain based image hiding scheme with distortion tolerance
Computers and Electrical Engineering
An adaptive LSB matching steganography based on octonary complexity measure
Multimedia Tools and Applications
Steganalysis of a PVD-based content adaptive image steganography
Signal Processing
Edge based steganography on colored images
ICIC'13 Proceedings of the 9th international conference on Intelligent Computing Theories
A data hiding scheme based upon DCT coefficient modification
Computer Standards & Interfaces
Hi-index | 0.10 |
A new and efficient steganographic method for embedding secret messages into a gray-valued cover image is proposed. In the process of embedding a secret message, a cover image is partitioned into non-overlapping blocks of two consecutive pixels. A difference value is calculated from the values of the two pixels in each block. All possible difference values are classified into a number of ranges. The selection of the range intervals is based on the characteristics of human vision's sensitivity to gray value variations from smoothness to contrast. The difference value then is replaced by a new value to embed the value of a sub-stream of the secret message. The number of bits which can be embedded in a pixel pair is decided by the width of the range that the difference value belongs to. The method is designed in such a way that the modification is never out of the range interval. This method provides an easy way to produce a more imperceptible result than those yielded by simple least-significant-bit replacement methods. The embedded secret message can be extracted from the resulting stego-image without referencing the original cover image. Moreover, a pseudo-random mechanism may be used to achieve secrecy protection. Experimental results show the feasibility of the proposed method. Dual statistics attacks were also conducted to collect related data to show the security of the method.