References
- C. K. Chan et al., Hiding data in images by simple LSB substitution, Pattern Recog. 37 (2004), 469-474. https://doi.org/10.1016/j.patcog.2003.08.007
- J. Fridrich et al., Reliable detection of LSB steganography in color and grayscale images, Int. Conf. Multimedia Security: New Challenges, Ottawa, Canada, Oct. 2001, pp. 27-30.
- J. Mielikainen, LSB matching revisited, IEEE Signal Process. Lett. 13 (2006), no. 5, 285-287. https://doi.org/10.1109/LSP.2006.870357
- X. Zhang and S. Wnag, Efficient steganographic embedding by exploiting modification direction, IEEE Commun. Lett. 10 (2006), no. 11, 781-783. https://doi.org/10.1109/LCOMM.2006.060863
- H. Hajizadeh, A. Ayatollahi, and S. Mirzakuchaki, A new high capacity and EMD-based image steganography scheme in spatial domain, Iranian Conf. Electrical Eng., Mashhad, Iran, May 2013, pp. 1-6.
- T. D. Kieu and C. Chang, A steganographic scheme by fully exploiting modification directions, Expert Syst. Appl. 38 (2011), no. 8, 10648-10657. https://doi.org/10.1016/j.eswa.2011.02.122
- J. H. Kim et al., Improved modification direction methods, Comput. Math. Appl. 60 (2010), no. 2, 319-325. https://doi.org/10.1016/j.camwa.2010.01.006
- C. F. Lee, Y. R. Wnag, and C. C. Chang, A steganographic method with high embedding capacity by improving exploiting modification direction, Int. Conf. Intell. Inform. Hiding Multimedia Signal Process., Kaohsiung, Taiwan, Nov. 2007, pp. 497-500.
- J. Wang et al., An improved section-wise exploiting modification direction method, Signal Process. 90 (2010), no. 11, 2954-2964. https://doi.org/10.1016/j.sigpro.2010.04.022
- C. C. Chang, Y. C. Chou, and T. D. Kieu, An information hiding scheme using Sudoku, Int. Conf. Innovative Comput. Inform. Contr., Dalian, Liaoning, China, June 2008, pp. 17-22.
- D. C. Wu et al., A steganographic method for images by pixelvalue differencing, Pattern Recog. Lett. 24 (2003), no. 9-10, 1613-1626. https://doi.org/10.1016/S0167-8655(02)00402-6
- J. C. Joo, H. Y. Lee, and H. K. Lee, Improved steganographic method preserving pixel-value differencing histogram with modulus function, EURASIP J. Adv. Signal Proc. 2010 (2010), 1-13.
- C. M. Wang et al., A high quality steganographic method with pixel-value differencing and modulus function, J. Sys. Soft. 81 (2008), no. 1, 150-158. https://doi.org/10.1016/j.jss.2007.01.049
- S. Y. Shen and L. H. Huang, A data hiding scheme using pixel value differencing and improving exploiting modification directions, Comput. Security 48 (2015), 131-141. https://doi.org/10.1016/j.cose.2014.07.008
- B. Kaur, A. Kaur, and J. Singh, Steganographic approach for hiding image in DCT domain, Int. J. Adv. Eng. Technol. 1 (2011), 72-78.
- C. C. Lin and P. F. Shiu, High capacity data hiding scheme for DCT-based images, J. Inform. Hiding Multimedia Signal Proc. 1 (2010), no. 3, 220-240.
- B. K. Panigrahi and P. S. Reddy, High quality high capacity robust DWT based steganography, Int. J. Innov. Res. Dev. 3 (2014), no. 5, 49-52.
- Y. P. Lee et al., High-payload image hiding with quality recovery using tri-way pixel-value differencing, Inform. Sci. 191 (2012), 214-255. https://doi.org/10.1016/j.ins.2012.01.002
- X. Zhang, S. Wnag, and Z. Zhou, Multibit assignment steganography in palette images, IEEE Sign. Proc. Lett. 15 (2008), 553-556. https://doi.org/10.1109/LSP.2008.2001117
- H. Z. Wu et al., Multi-layer assignment steganography using graph-theoretic approach, Multimedia Tools Appl. 74 (2015), no. 18, 8171-8196. https://doi.org/10.1007/s11042-014-2050-y
- S. Voloshynovskiy et al., Attacks on digital watermarks: Classification, estimation based attacks and benchmarks, IEEE Commun. Mag. 39 (2001), no. 8, 118-126. https://doi.org/10.1109/35.940053
- N. M. Makbol and B. E. Khoo, Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition, AEU - Int. J. Elec. Commun. 67 (2013), no. 2, 102-112. https://doi.org/10.1016/j.aeue.2012.06.008
- Z. Wang and A. C. Bovik, A universal image quality index, IEEE Sign. Proc. Lett. 9 (2002), no. 3, 81-84. https://doi.org/10.1109/97.995823
- C. C. Chang and T. C. Lu, A difference expansion oriented data hiding scheme for restoring the original host image, J. Sys. Soft. 79 (2006), no. 12, 1754-1766. https://doi.org/10.1016/j.jss.2006.03.035
- C. T. Lu, C. C. Chang, and Y. H. Huang, High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting, Multimedia Tools Appl. 72 (2014), no. 1, 417-435. https://doi.org/10.1007/s11042-013-1369-0
Cited by
- An Advanced Reversible Data Hiding Algorithm Using Local Similarity, Curved Surface Characteristics, and Edge Characteristics in Images vol.10, pp.3, 2020, https://doi.org/10.3390/app10030836