References
- T. Kanai, H. Suzuki, and F. Kimura, "Metamorphosis of arbitrary triangular meshes," IEEE Computer Graphics and Applications, vol. 20, no. 2, pp. 62-75, 2000.
- H. Nakamura and Z. Qiangfu, "Information hiding based on image morphing," in Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, Okinawa, Japan, 2008, pp. 1585-1590.
- S. Kondo and Q. Zhao, "A novel steganographic technique based on image morphing," in Ubiquitous Intelligence and Computing: Proceedings of the Third International Conference, Wuhan, China, September 3-6, 2006 (Lecture Notes in Computer Science Vol. 4159), J. Ma, H. Jin, L. Yang, and J. P. Tsai, Eds. Heidelberg, Germany: Springer Berlin, 2006, pp. 806-815.
- A. M. Bagade and S. N. Talbar, "Image morphing concept for secure transmission of image data contents over internet," Journal of Computer Science, vol. 6, no. 9, pp. 987-992, 2010. https://doi.org/10.3844/jcssp.2010.987.992
- W. Ying and P. Moulin, "Perfectly secure steganography: capacity, error exponents, and code constructions," IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2706-2722, 2008. https://doi.org/10.1109/TIT.2008.921684
- S. Narayana and G. Prasad, "Two new approaches for secured image steganography using cryptographic techniques and type conversions," Signal & Image Processing, vol. 1, no. 2, pp. 60-73, 2010.
- P. A. Regalia, "Cryptographic secrecy of steganographic matrix embedding," IEEE Transactions on Information Forensics and Security, vol. 3, no. 4, pp. 786-791, 2008. https://doi.org/10.1109/TIFS.2008.2002940
- M. Mohamed, F. Al-Afari, and M. Bamatraf, "Data hiding by LSB substitution using genetic optimal key-permutation," International Arab Journal of e-Technology, vol. 2, no. 1, pp. 11-17, 2011.
- X. Liao, Q. Y. Wen, and J. Zhang, "A steganographic method for digital images with four-pixel differencing and modified LSB substitution," Journal of Visual Communication and Image Representation, vol. 22, no. 1, pp. 1-8, 2011. https://doi.org/10.1016/j.jvcir.2010.08.007
- C. K. Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition, vol. 37, no. 3, pp. 469-474, 2004. https://doi.org/10.1016/j.patcog.2003.08.007
- R. Z. Wang, C. F. Lin, and J. C. Lin, "Image hiding by optimal LSB substitution and genetic algorithm," Pattern Recognition, vol. 34, no. 3, pp. 671-683, 2001. https://doi.org/10.1016/S0031-3203(00)00015-7
- C. C. Chang, J. Y. Hsiao, and C. S. Chan, "Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy," Pattern Recognition, vol. 36, no. 7, pp. 1583-1595, 2003. https://doi.org/10.1016/S0031-3203(02)00289-3
- Z. Xinpeng, "Efficient data hiding with plus-minus one or two," IEEE Signal Processing Letters, vol. 17, no. 7, pp. 635-638, 2010. https://doi.org/10.1109/LSP.2010.2049415
- K. C. Chang, C. P. Chang, P. S. Huang, and T. M. Tua, "A novel image steganographic method using tri-way pixel-value differencing," Journal of Multimedia, vol. 3, no. 2, pp. 37-44, 2008.
- G. Swain and S. Lenka, "LSB array based image steganography technique by exploring the four least significant bits," in Global Trends in Information Systems and Software Applications (Communications in Computer and Information Science Vol. 270), P. V. Krishna, M. R. Babu, and E. Ariwa, Eds. Heidelberg, Germany: Springer Berlin, 2012, pp. 479-488.
- C. H. Yang, "Inverted pattern approach to improve image quality of information hiding by LSB substitution," Pattern Recognition, vol. 41, no. 8, pp. 2674-2683, 2008. https://doi.org/10.1016/j.patcog.2008.01.019
- E. Walia, P. Jain, and Navdeep, "An analysis of LSB & DCT based steganography," Global Journal of Computer Science and Technology, vol. 10, no. 1, pp. 4-8, 2010.
- L. Yu, Y. Zhao, R. Ni, and T. Li, "Improved adaptive LSB steganography based on chaos and genetic algorithm," EURASIP Journal on Advances in Signal Processing, vol. 2010, no. 1, pp. 876946, 2010. https://doi.org/10.1155/2010/876946
- H. B. Kekre, A. Athawale, and P. N. Halarnkar, "Increased capacity of information hiding in LSB's method for text and image," World Academy of Science, Engineering and Technology, vol. 2, no. 5, pp. 657-660, 2008.
- A. Yadollahpour and H. M. Naimi, "Attack on LSB steganography in color and grayscale images. using autocorrelation coefficients," European Journal of Scientific Research, vol. 31, no. 2, pp. 172-183, 2009.
- C. H. Hsieh and Q. Zhao, "Image enhancement and image hiding based on linear image fusion," in Image Fusion [Online], O. Ukimura, Ed. Intech, 2011, Chapter 2. Available: http://dx.doi.org/10.5772/14331
- M. Kharrazi, H. Sencar, and N. Memon, "Improving steganalysis by fusion techniques: a case study with image steganography," in Transactions on Data Hiding and Multimedia Security I (Lecture Notes in Computer Science Vol. 4300), Y. Shi, Ed. Heidelberg, Germany: Springer Berlin, 2006, pp. 123-137.
- N. N. EL-Emam, "Hiding a large amount of data with high security using steganography algorithm," Journal of Computer Science, vol. 3, no. 4, pp. 223-232, 2007. https://doi.org/10.3844/jcssp.2007.223.232
- A. Westfeld and A. Pfitzmann, "Attacks on steganographic systems," in Information Hiding: Third International Workshop, IH'99, Dresden, Germany, September 29-October 1, 1999 Proceedings (Lecture Notes in Computer Science Vol. 1768), A. Pfitzmann, Ed. Heidelberg, Germany: Springer Berlin, 2000, pp. 61-76.
- C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, "A high quality steganographic method with pixel-value differencing and modulus function," Journal of Systems and Software, vol. 81, no. 1, pp. 150-158, 2008. https://doi.org/10.1016/j.jss.2007.01.049
- A. Nissar and A. H. Mir, "Classification of steganalysis techniques: a study," Digital Signal Processing, vol. 20, no. 6, pp. 1758-1770, 2010. https://doi.org/10.1016/j.dsp.2010.02.003
- R. Amirtharajan, R. Akila, and P. Deepikachowdavarapu, "A comparative analysis of image steganography," International Journal of Computer Applications, vol. 2, no. 3, pp. 41-47, 2010. https://doi.org/10.5120/644-900
- H. S. Manjunatha Reddy and K. B. Raja, "High capacity and security steganography using Discrete Wavelet Transform," International Journal of Computer Science and Security, vol. 3, no. 6, pp. 462-472, 2010.
- L. Siwei and H. Farid, "Steganalysis using higher-order image statistics," IEEE Transactions on Information Forensics and Security, vol. 1, no. 1, pp. 111-119, 2006. https://doi.org/10.1109/TIFS.2005.863485
- H. Sajedi and M. Jamzad, "Secure steganography based on embedding capacity," International Journal of Information Security, vol. 8, no. 6, pp. 433-445, 2009. https://doi.org/10.1007/s10207-009-0089-y
- R. Shreelekshmi, M. Wilscy, and C. E. V. Madhavan, "Cover image preprocessing for more reliable LSB replacement steganography," in Proceedings of the International Conference on Signal Acquisition and Processing, Bangalore, India, 2010, pp. 153-156.
- R. Z. Wang and Y. S. Chen, "High-payload image steganography using two-way block matching," IEEE Signal Processing Letters, vol. 13, no. 3, pp. 161-164, 2006. https://doi.org/10.1109/LSP.2005.862603
- M. W. Chao, C. H. Lin, C. W. Yu, and T. Y. Lee, "A high capacity 3D steganography algorithm," IEEE Transactions on Visualization and Computer Graphics, vol. 15, no. 2, pp. 274-84, 2009. https://doi.org/10.1109/TVCG.2008.94
- I. Avcibas, N. Memon, and B. Sankur, "Steganalysis using image quality metrics," IEEE Transactions on Image Processing, vol. 12, no. 2, pp. 221-229, 2003. https://doi.org/10.1109/TIP.2002.807363
- M. Kharrazi, H. T. Sencar, and N. D. Memon, "Performance study of common image steganography and steganalysis techniques," Journal of Electronic Imaging, vol. 15, no. 4, pp. 041104, 2006. https://doi.org/10.1117/1.2400672
- The USC-SIPI Image Database [Online]. Available: http://sipi.usc.edu/database/
- S. F. Mare, M. Vladutiu, and L. Prodan, "Decreasing change impact using smart LSB pixel mapping and data rearrangement," in Proceedings of the IEEE 11th International Conference on Computer and Information Technology, Pafos, Cyprus, 2011, pp. 269-276.
Cited by
- Audio Data Hiding Based on Sample Value Modification Using Modulus Function 2016, https://doi.org/10.3745/JIPS.03.0054
- Security of Image Information using Steganography and QR Code in IoT vol.15, pp.2, 2015, https://doi.org/10.7236/JIIBC.2015.15.2.31
- Information Hiding Method Using Best DCT and Wavelet Coefficients and ItsWatermark Competition vol.17, pp.3, 2015, https://doi.org/10.3390/e17031218
- Watermarking technique based on three-coefficient comparison in DCT domain vol.72, pp.7, 2016, https://doi.org/10.1007/s11227-015-1531-8
- Data embedding in audio signal using multiple bit marking layers method vol.76, pp.9, 2017, https://doi.org/10.1007/s11042-016-3851-y