메뉴 건너뛰기




Volumn 4, Issue 1, 2007, Pages 1-9

Data hiding: Current status and key issues

Author keywords

Data hiding; Hidden Capacity; Imperceptible; Secure Communication; Steganography

Indexed keywords

COVERT COMMUNICATIONS; CRYPTOGRAPHIC TECHNIQUES; DATA HIDING; GRAY-SCALE IMAGES; HIDDEN CAPACITY; IMAGE STEGANOGRAPHY; IMPERCEPTIBLE; SECURE COMMUNICATIONS;

EID: 35848951182     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (131)

References (30)
  • 1
    • 0346216907 scopus 로고    scopus 로고
    • Hiding data in images by simple LSB substitution
    • Mar
    • C. K. Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition, pp. 469-474, Mar. 2004.
    • (2004) Pattern Recognition , pp. 469-474
    • Chan, C.K.1    Cheng, L.M.2
  • 2
    • 0036497685 scopus 로고    scopus 로고
    • A steganographic method based upon JPEG and quantization table modification
    • Mar
    • C. C. Chang, T. S. Chen, and L. Z. Chung, "A steganographic method based upon JPEG and quantization table modification," Information Sciences, vol. 141, pp. 123-138, Mar. 2002.
    • (2002) Information Sciences , vol.141 , pp. 123-138
    • Chang, C.C.1    Chen, T.S.2    Chung, L.Z.3
  • 3
    • 0037411306 scopus 로고    scopus 로고
    • Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy
    • C. C. Chang, J. Y. Hsiao, and C. S. Chan, "Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy," Pattern Recognition, vol. 36, no. 7, pp. 1583-1595, 2003.
    • (2003) Pattern Recognition , vol.36 , Issue.7 , pp. 1583-1595
    • Chang, C.C.1    Hsiao, J.Y.2    Chan, C.S.3
  • 4
    • 4544351078 scopus 로고    scopus 로고
    • A steganographic method for digital images using side match
    • C. C. Chang and H. W. Tseng, "A steganographic method for digital images using side match," Pattern Recognition Letter, no. 25, pp. 1431-1437, 2004.
    • (2004) Pattern Recognition Letter , Issue.25 , pp. 1431-1437
    • Chang, C.C.1    Tseng, H.W.2
  • 5
    • 27844504298 scopus 로고    scopus 로고
    • A new framework of lsb steganalysis of digital media
    • Oct
    • S. Dumitrescu and X. Wu, "A new framework of lsb steganalysis of digital media," IEEE Transactions on Signal Process, vol. 53, pp. 3923-3935, Oct. 2005.
    • (2005) IEEE Transactions on Signal Process , vol.53 , pp. 3923-3935
    • Dumitrescu, S.1    Wu, X.2
  • 6
    • 0037524382 scopus 로고    scopus 로고
    • Detection of lsb steganography via sample pair analysis
    • Jul
    • S. Dumitrescu, X. Wu, and Z. Wang, "Detection of lsb steganography via sample pair analysis," IEEE Transactions on Signal Process, vol. 51, pp. 1995-2007, Jul. 2003.
    • (2003) IEEE Transactions on Signal Process , vol.51
    • Dumitrescu, S.1    Wu, X.2    Wang, Z.3
  • 8
    • 2342464968 scopus 로고    scopus 로고
    • Digital steganography utilizing features of JPEG images
    • Apr
    • M. IWATA, K. MIYAKE, and A. SHIOZAKI, "Digital steganography utilizing features of JPEG images," IEICE Transactions on Fundamentals, vol. E87-A, pp. 929-936, Apr. 2004.
    • (2004) IEICE Transactions on Fundamentals , vol.E87 , Issue.A , pp. 929-936
    • Iwata, M.1    Miyake, K.2    Shiozaki, A.3
  • 9
    • 20444404178 scopus 로고    scopus 로고
    • Steganalysis of lsb matching in grayscale images
    • June
    • A. D. Ker, "Steganalysis of lsb matching in grayscale images," IEEE Signal Processing Letters, vol. 12, pp. 441-444, June 2005.
    • (2005) IEEE Signal Processing Letters , vol.12 , pp. 441-444
    • Ker, A.D.1
  • 10
    • 4444342040 scopus 로고    scopus 로고
    • Secret image sharing with steganography and authentication
    • Nov
    • C. C. Lin andW. H. Tsai, "Secret image sharing with steganography and authentication," Journal of Systems and Software, vol. 73, pp. 405-414, Nov. 2004.
    • (2004) Journal of Systems and Software , vol.73 , pp. 405-414
    • Lin, C.C.1    Tsai, W.H.2
  • 11
    • 0036329257 scopus 로고    scopus 로고
    • Steganographic method for secure communications
    • June
    • D. C. Lou and J. L. Liu, "Steganographic method for secure communications," Computers and Security, vol. 21, pp. 449-460, June 2002.
    • (2002) Computers and Security , vol.21 , pp. 449-460
    • Lou, D.C.1    Liu, J.L.2
  • 14
    • 18844400288 scopus 로고    scopus 로고
    • A foundation for watermarking in compressed domain
    • May
    • B. G. Mobasseri and R. J. Berger, "A foundation for watermarking in compressed domain," IEEE Signal Processing Letters, vol. 12, pp. 399-402, May 2005.
    • (2005) IEEE Signal Processing Letters , vol.12 , pp. 399-402
    • Mobasseri, B.G.1    Berger, R.J.2
  • 15
    • 0001217738 scopus 로고
    • The prisoners' problem and the subliminal channel
    • G. J. Simmons, "The prisoners' problem and the subliminal channel," in Proceedings of Crypto'83, pp. 51-67, 1984.
    • (1984) in Proceedings of Crypto'83 , pp. 51-67
    • Simmons, G.J.1
  • 16
    • 0142057129 scopus 로고    scopus 로고
    • A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
    • C. C. Thien and J. C. Lin, "A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function," Pattern Recognition, vol. 36, no. 12, pp. 2875-2881, 2003.
    • (2003) Pattern Recognition, vol. 36, no. 12 , pp. 2875-2881
    • Thien, C.C.1    Lin, J.C.2
  • 17
    • 2442555374 scopus 로고    scopus 로고
    • High capacity data hiding in jpeg-compressed images
    • H. W. Tseng and C. C. Chnag, "High capacity data hiding in jpeg-compressed images," Informatica, vol. 15, no. 1, pp. 127-142, 2004.
    • (2004) Informatica , vol.15 , Issue.1 , pp. 127-142
    • Tseng, H.W.1    Chnag, C.C.2
  • 19
    • 0036646834 scopus 로고    scopus 로고
    • Data hiding in 2-color imgages
    • July
    • Y. C. Tseng and H. K. Pan, "Data hiding in 2-color imgages," IEEE Transactions on Computers, vol. 51, pp. 873-878, July 2002.
    • (2002) IEEE Transactions on Computers , vol.51 , pp. 873-878
    • Tseng, Y.C.1    Pan, H.K.2
  • 20
    • 0141953943 scopus 로고    scopus 로고
    • A new approach to authentication of binary image for multimedia communication with distortion reduction and security enhancement
    • Sept
    • C. H. Tzeng andW. H. Tsai, "A new approach to authentication of binary image for multimedia communication with distortion reduction and security enhancement," IEEE Communications Letters, vol. 7, pp. 443-445, Sept. 2003.
    • (2003) IEEE Communications Letters , vol.7 , pp. 443-445
    • Tzeng, C.H.1    Tsai, W.H.2
  • 21
    • 3042638288 scopus 로고    scopus 로고
    • A combined approach to integrity protection and verification of palette images using fragile watermarks and digital signatures
    • June
    • C. H. Tzeng and W. H. Tsai, "A combined approach to integrity protection and verification of palette images using fragile watermarks and digital signatures," IEICE Transactions on Fundamentals, vol. E87-A, pp. 1612-1619, June 2004.
    • (2004) IEICE Transactions on Fundamentals, vol. E87-A , pp. 1612-1619
    • Tzeng, C.H.1    Tsai, W.H.2
  • 22
    • 2942519383 scopus 로고    scopus 로고
    • Adaptive data hiding in palette images by color ordering and mapping with security protection
    • May
    • C. H. Tzeng, Z. F. Yang, and W. H. Tsai, "Adaptive data hiding in palette images by color ordering and mapping with security protection," IEEE Transactions on Communications, vol. 52, pp. 791-800, May 2004.
    • (2004) IEEE Transactions on Communications, vol. 52 , pp. 791-800
    • Tzeng, C.H.1    Yang, Z.F.2    Tsai, W.H.3
  • 23
    • 0035283377 scopus 로고    scopus 로고
    • Image hiding by optimal lsb substitution and genetic algorithm
    • R. Z. Wang, C. F. Lin, and J. C. Lin, "Image hiding by optimal lsb substitution and genetic algorithm," Pattern Recognition, vol. 34, no. 3, pp. 671-683, 2001.
    • (2001) Pattern Recognition , vol.34 , Issue.3 , pp. 671-683
    • Wang, R.Z.1    Lin, C.F.2    Lin, J.C.3
  • 24
    • 14844354093 scopus 로고    scopus 로고
    • Steganography of capacity required using modulo operator for embedding secret image
    • Jan
    • S. J. Wang, "Steganography of capacity required using modulo operator for embedding secret image," Applied Mathematics and Computation, vol. 164, pp. 99-116, Jan. 2005.
    • (2005) Applied Mathematics and Computation , vol.164 , pp. 99-116
    • Wang, S.J.1
  • 25
    • 0037410595 scopus 로고    scopus 로고
    • A steganographic method for images by pixel-value differencing
    • D. C. Wu and W. H. Tsai, "A steganographic method for images by pixel-value differencing," Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1613- 1626, 2003.
    • (2003) Pattern Recognition Letters , vol.24 , Issue.9-10 , pp. 16131626
    • Wu, D.C.1    Tsai, W.H.2
  • 26
    • 27144475598 scopus 로고    scopus 로고
    • Image steganographic scheme based on pixel-value differencing and LSB replacement methods
    • Oct
    • H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, "Image steganographic scheme based on pixel-value differencing and LSB replacement methods," IEE Proceedings of Visual Image Signal Process, vol. 152, pp. 611-615, Oct. 2005.
    • (2005) IEE Proceedings of Visual Image Signal Process , vol.152 , pp. 611-615
    • Wu, H.C.1    Wu, N.I.2    Tsai, C.S.3    Hwang, M.S.4
  • 27
    • 0347355321 scopus 로고    scopus 로고
    • An iterative method of palette-based image steganography
    • M. Y. Wu, Y. K. Ho, and J. H. Lee, "An iterative method of palette-based image steganography," Pattern Recognition Letters, vol. 25, pp. 301-309, 2004.
    • (2004) Pattern Recognition Letters , vol.25 , pp. 301-309
    • Wu, M.Y.1    Ho, Y.K.2    Lee, J.H.3
  • 28
    • 3242759877 scopus 로고    scopus 로고
    • Data hiding in binary image for authentication and annotation
    • Aug
    • Min Wu and Bede Liu, "Data hiding in binary image for authentication and annotation," IEEE Transactions on Multimedia, vol. 6, pp. 528-538, Aug. 2004.
    • (2004) IEEE Transactions on Multimedia, vol. 6 , pp. 528-538
    • Wu, M.1    Liu, B.2
  • 29
    • 13644262818 scopus 로고    scopus 로고
    • Hiding secret data in images via predictive coding
    • May
    • Y. H. Yu, C. C. Chang, and Y. C. Hu, "Hiding secret data in images via predictive coding," Pattern Recognition, vol. 38, pp. 691-705, May 2005.
    • (2005) Pattern Recognition , vol.38 , pp. 691-705
    • Yu, Y.H.1    Chang, C.C.2    Hu, Y.C.3
  • 30
    • 11844253853 scopus 로고    scopus 로고
    • Steganography using multiple-base notational system and human vision sensitivity
    • Jan
    • X. Zhang and S. Wang, "Steganography using multiple-base notational system and human vision sensitivity," IEEE Signal Processing Letters, vol. 12, pp. 67-70, Jan. 2005.
    • (2005) IEEE Signal Processing Letters , vol.12 , pp. 67-70
    • Zhang, X.1    Wang, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.