메뉴 건너뛰기




Volumn 185, Issue 1, 2007, Pages 432-448

Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation

Author keywords

Adaptive phase modulation (APM); Chaotic mechanism (CM); Discrete Fourier transform (DFT); Frequency hopping (FH); Set partitioning in hierarchical trees (SPIHT); Stego image

Indexed keywords

FOURIER TRANSFORMS; HIERARCHICAL SYSTEMS; IMAGE CODING; IMAGE COMPRESSION; TREES (MATHEMATICS); WAVELET TRANSFORMS;

EID: 33846993721     PISSN: 00963003     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.amc.2006.07.041     Document Type: Article
Times cited : (70)

References (26)
  • 3
    • 0035472155 scopus 로고    scopus 로고
    • Deteting LSB steganography in color and gray-scale images
    • Fridrich J., Goljan M., and Du R. Deteting LSB steganography in color and gray-scale images. IEEE Transactions on Multimedia 8 4 (2001) 22-28
    • (2001) IEEE Transactions on Multimedia , vol.8 , Issue.4 , pp. 22-28
    • Fridrich, J.1    Goljan, M.2    Du, R.3
  • 4
    • 4444342040 scopus 로고    scopus 로고
    • Secret image sharing with steganography and authentication
    • Lin C.C., and Tsai W.H. Secret image sharing with steganography and authentication. The Journal of System and Software 73 (2004) 405-414
    • (2004) The Journal of System and Software , vol.73 , pp. 405-414
    • Lin, C.C.1    Tsai, W.H.2
  • 6
    • 10644225222 scopus 로고    scopus 로고
    • A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection
    • Chen W.Y., and Chen C.H. A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection. Pattern Recognition 38 4 (2005) 587-598
    • (2005) Pattern Recognition , vol.38 , Issue.4 , pp. 587-598
    • Chen, W.Y.1    Chen, C.H.2
  • 7
    • 10044224284 scopus 로고    scopus 로고
    • Secure semi-blind watermarking based on iteration mapping and image features
    • Ni R., Ruan Q., and Cheng H.D. Secure semi-blind watermarking based on iteration mapping and image features. Pattern Recognition 38 3 (2005) 357-368
    • (2005) Pattern Recognition , vol.38 , Issue.3 , pp. 357-368
    • Ni, R.1    Ruan, Q.2    Cheng, H.D.3
  • 9
    • 14844354093 scopus 로고    scopus 로고
    • Steganography of capacity required using modulo operator for embedding secret image
    • Wang S.J. Steganography of capacity required using modulo operator for embedding secret image. Applied Mathematics and Computation 164 (2005) 99-116
    • (2005) Applied Mathematics and Computation , vol.164 , pp. 99-116
    • Wang, S.J.1
  • 10
    • 0033309034 scopus 로고    scopus 로고
    • Data hiding in image with adaptive numbers of least significant bits based on the human visual system
    • Lie W.N., and Chang L.C. Data hiding in image with adaptive numbers of least significant bits based on the human visual system. IEEE International Conference on Image Processing 28 (1999) 286-290
    • (1999) IEEE International Conference on Image Processing , vol.28 , pp. 286-290
    • Lie, W.N.1    Chang, L.C.2
  • 11
    • 0034514476 scopus 로고    scopus 로고
    • Hiding data in images by optimal moderately-significant-bit replacement
    • Wang R.Z., Lin C.F., and Lin J.C. Hiding data in images by optimal moderately-significant-bit replacement. Electronics Letters 36 25 (2000) 2069-2070
    • (2000) Electronics Letters , vol.36 , Issue.25 , pp. 2069-2070
    • Wang, R.Z.1    Lin, C.F.2    Lin, J.C.3
  • 12
    • 0344217010 scopus 로고    scopus 로고
    • Steganography: an efficient data hiding method
    • Hou Y.C., and Chiao Y.F. Steganography: an efficient data hiding method. Journal of Technology 15 3 (2000) 363-372
    • (2000) Journal of Technology , vol.15 , Issue.3 , pp. 363-372
    • Hou, Y.C.1    Chiao, Y.F.2
  • 13
    • 0032206939 scopus 로고    scopus 로고
    • Data hiding in images via multiple-based number conversion and lossy compression
    • Wu D.C., and Tsai W.H. Data hiding in images via multiple-based number conversion and lossy compression. IEEE Transactions on Consumer Electronics 44 4 (1998) 1406-1412
    • (1998) IEEE Transactions on Consumer Electronics , vol.44 , Issue.4 , pp. 1406-1412
    • Wu, D.C.1    Tsai, W.H.2
  • 18
    • 0035510211 scopus 로고    scopus 로고
    • Circularly symmetric watermark embedding in 2-D DFT domain
    • Solachidis V., and Pitas I. Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Transactions on Image Processing 10 465 (2001) 1741-1753
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.465 , pp. 1741-1753
    • Solachidis, V.1    Pitas, I.2
  • 19
    • 0027798110 scopus 로고
    • Embedded image coding using zerotrees of wavelet coefficients
    • Shapior J.M. Embedded image coding using zerotrees of wavelet coefficients. IEEE Transactions on Signal Processing 41 12 (1993) 3445-3462
    • (1993) IEEE Transactions on Signal Processing , vol.41 , Issue.12 , pp. 3445-3462
    • Shapior, J.M.1
  • 20
  • 26
    • 0345377853 scopus 로고    scopus 로고
    • Public-key image steganography using DCT and QPVQ coding
    • Chen W.-Y., and Chen C.-H. Public-key image steganography using DCT and QPVQ coding. Optical Engineering 42 10 (2003) 2886-2892
    • (2003) Optical Engineering , vol.42 , Issue.10 , pp. 2886-2892
    • Chen, W.-Y.1    Chen, C.-H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.