메뉴 건너뛰기




Volumn 41, Issue 8, 2008, Pages 2674-2683

Inverted pattern approach to improve image quality of information hiding by LSB substitution

Author keywords

Image processing; Information hiding; LSB substitution; Security

Indexed keywords

IMAGE CODING; IMAGE QUALITY; PIXELS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 42749096863     PISSN: 00313203     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.patcog.2008.01.019     Document Type: Article
Times cited : (125)

References (28)
  • 1
    • 0031331952 scopus 로고    scopus 로고
    • Data encryption: a non-mathematical approach
    • Highland H.J. Data encryption: a non-mathematical approach. Comput. Secur. 16 (1997) 369-386
    • (1997) Comput. Secur. , vol.16 , pp. 369-386
    • Highland, H.J.1
  • 3
    • 42749087546 scopus 로고    scopus 로고
    • C.C. Chang, Y.C. Chou, T.D Kieu, High capacity data hiding for grayscale images, in: Proceedings of the First International Conference on Ubiquitous Information Management and Communication, Seoul, Korea, February 2007, pp. 139-148.
    • C.C. Chang, Y.C. Chou, T.D Kieu, High capacity data hiding for grayscale images, in: Proceedings of the First International Conference on Ubiquitous Information Management and Communication, Seoul, Korea, February 2007, pp. 139-148.
  • 4
    • 34247135365 scopus 로고    scopus 로고
    • Lossless data hiding in the spatial domain for high quality images
    • Jin H.L., Fujiyoshi M., and Kiya H. Lossless data hiding in the spatial domain for high quality images. IEICE Trans. Fundam. E90-A 4 (2007) 771-777
    • (2007) IEICE Trans. Fundam. , vol.E90-A , Issue.4 , pp. 771-777
    • Jin, H.L.1    Fujiyoshi, M.2    Kiya, H.3
  • 5
    • 35048891531 scopus 로고    scopus 로고
    • A. Ker, Improved detection of LSB steganography in grayscale images, in: Proceedings of the Information Hiding Workshop, in: Lecture Notes in Computer Science, vol. 3200, Springer, Berlin, 2004, pp. 97-11.
    • A. Ker, Improved detection of LSB steganography in grayscale images, in: Proceedings of the Information Hiding Workshop, in: Lecture Notes in Computer Science, vol. 3200, Springer, Berlin, 2004, pp. 97-11.
  • 8
    • 0036329257 scopus 로고    scopus 로고
    • Steganographic method for secure communications
    • Lou D.C., and Liu J.L. Steganographic method for secure communications. Comput. Secur. 21 5 (2002) 449-460
    • (2002) Comput. Secur. , vol.21 , Issue.5 , pp. 449-460
    • Lou, D.C.1    Liu, J.L.2
  • 10
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • Wong P.W. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10 10 (2001) 1593-1601
    • (2001) IEEE Trans. Image Process. , vol.10 , Issue.10 , pp. 1593-1601
    • Wong, P.W.1
  • 11
    • 1942486241 scopus 로고    scopus 로고
    • Wavelet tree quantization for copyright protection watermarking
    • Wang S.H., and Lin Y.P. Wavelet tree quantization for copyright protection watermarking. IEEE Trans. Image Process. 13 2 (2004) 154-165
    • (2004) IEEE Trans. Image Process. , vol.13 , Issue.2 , pp. 154-165
    • Wang, S.H.1    Lin, Y.P.2
  • 12
    • 25144448272 scopus 로고    scopus 로고
    • A hierarchical digital watermarking method for image tamper detection and recovery
    • Lin P.L., Hsieh C.K., and Huang P.W. A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 38 (2005) 2519-2529
    • (2005) Pattern Recognition , vol.38 , pp. 2519-2529
    • Lin, P.L.1    Hsieh, C.K.2    Huang, P.W.3
  • 13
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • Celik M.U., Sharma G., Saber E., and Tekalp A.M. Hierarchical watermarking for secure image authentication with localization. IEEE Trans. Image Process. 11 (2002) 585-595
    • (2002) IEEE Trans. Image Process. , vol.11 , pp. 585-595
    • Celik, M.U.1    Sharma, G.2    Saber, E.3    Tekalp, A.M.4
  • 14
    • 33744903116 scopus 로고    scopus 로고
    • A. Harada, T. Isarida, T. Mizuno, M. Nishigaki, A user authentication system using schema of visual memory, in: Lecture Notes in Computer Science, vol. 3853, 2006, pp. 338-345.
    • A. Harada, T. Isarida, T. Mizuno, M. Nishigaki, A user authentication system using schema of visual memory, in: Lecture Notes in Computer Science, vol. 3853, 2006, pp. 338-345.
  • 16
    • 0035283377 scopus 로고    scopus 로고
    • Image hiding by optimal LSB substitution and genetic algorithm
    • Wang R.Z., Lin C.F., and Lin J.C. Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition 34 3 (2000) 671-683
    • (2000) Pattern Recognition , vol.34 , Issue.3 , pp. 671-683
    • Wang, R.Z.1    Lin, C.F.2    Lin, J.C.3
  • 17
    • 0035797467 scopus 로고    scopus 로고
    • Improved hiding data in images by optimal moderately significant-bit replacement
    • Chan C.K., and Cheng L.M. Improved hiding data in images by optimal moderately significant-bit replacement. Electron. Lett. 37 16 (2001) 1017-1018
    • (2001) Electron. Lett. , vol.37 , Issue.16 , pp. 1017-1018
    • Chan, C.K.1    Cheng, L.M.2
  • 18
    • 0037411306 scopus 로고    scopus 로고
    • Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy
    • Chang C.C., Hsiao J.Y., and Chan C.S. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition 36 7 (2003) 1583-1595
    • (2003) Pattern Recognition , vol.36 , Issue.7 , pp. 1583-1595
    • Chang, C.C.1    Hsiao, J.Y.2    Chan, C.S.3
  • 19
    • 0346216907 scopus 로고    scopus 로고
    • Hiding data in images by simple LSB substitution
    • Chan C.K., and Chen L.M. Hiding data in images by simple LSB substitution. Pattern Recognition 37 3 (2004) 469-474
    • (2004) Pattern Recognition , vol.37 , Issue.3 , pp. 469-474
    • Chan, C.K.1    Chen, L.M.2
  • 20
    • 4544351078 scopus 로고    scopus 로고
    • A steganographic method for digital images using side match
    • Chang C.C., and W Tseng H. A steganographic method for digital images using side match. Pattern Recognition Lett. 25 12 (2004) 1431-1437
    • (2004) Pattern Recognition Lett. , vol.25 , Issue.12 , pp. 1431-1437
    • Chang, C.C.1    W Tseng, H.2
  • 21
    • 84993973063 scopus 로고    scopus 로고
    • Weighted bipartite graph for locating optimal LSB substitution for secret embedding
    • Yang C.H., and Wang S.J. Weighted bipartite graph for locating optimal LSB substitution for secret embedding. J. Discrete Math. Sci. Cryptography 9 1 (2006) 153-164
    • (2006) J. Discrete Math. Sci. Cryptography , vol.9 , Issue.1 , pp. 153-164
    • Yang, C.H.1    Wang, S.J.2
  • 22
    • 33747782523 scopus 로고    scopus 로고
    • New image steganographic methods using run-length approach
    • Chang C.C., Lin C.Y., and Wang Y.Z. New image steganographic methods using run-length approach. Inf. Sci. 176 (2006) 3393-3408
    • (2006) Inf. Sci. , vol.176 , pp. 3393-3408
    • Chang, C.C.1    Lin, C.Y.2    Wang, Y.Z.3
  • 23
    • 0037410595 scopus 로고    scopus 로고
    • A steganographic method for images by pixel-value differencing
    • Wu D.C., and Tsai W.H. A steganographic method for images by pixel-value differencing. Pattern Recognition Lett. 24 9-10 (2003) 1613-1626
    • (2003) Pattern Recognition Lett. , vol.24 , Issue.9-10 , pp. 1613-1626
    • Wu, D.C.1    Tsai, W.H.2
  • 24
    • 27144475598 scopus 로고    scopus 로고
    • Image steganographic scheme based on pixel-value differencing and LSB replacement methods
    • Wu H.C., Wu N.I., Tsai C.S., and Hwang M.S. Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proc. Vision Image Signal Process. 152 5 (2005) 611-615
    • (2005) IEE Proc. Vision Image Signal Process. , vol.152 , Issue.5 , pp. 611-615
    • Wu, H.C.1    Wu, N.I.2    Tsai, C.S.3    Hwang, M.S.4
  • 25
    • 42749087313 scopus 로고    scopus 로고
    • C.H. Yang, Chi-Yao Weng, A steganographic method for digital images by multi-pixel differencing, in: International Computer Symposium, Taipei, Taiwan, December 2006, pp. 831-836.
    • C.H. Yang, Chi-Yao Weng, A steganographic method for digital images by multi-pixel differencing, in: International Computer Symposium, Taipei, Taiwan, December 2006, pp. 831-836.
  • 26
    • 35848929919 scopus 로고    scopus 로고
    • A high quality steganography method with pixel-value differencing and modulus function
    • Wang C.M., Wu N.I., Tsai C.S., and Hwang M.S. A high quality steganography method with pixel-value differencing and modulus function. J. Syst. Software 81 1 (2008) 150-158
    • (2008) J. Syst. Software , vol.81 , Issue.1 , pp. 150-158
    • Wang, C.M.1    Wu, N.I.2    Tsai, C.S.3    Hwang, M.S.4
  • 27
    • 0142057129 scopus 로고    scopus 로고
    • A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
    • Thien C.C., and Lin J.C. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition 36 11 (2003) 2875-2881
    • (2003) Pattern Recognition , vol.36 , Issue.11 , pp. 2875-2881
    • Thien, C.C.1    Lin, J.C.2
  • 28
    • 14844354093 scopus 로고    scopus 로고
    • Steganography of capacity required using modulo operator for embedding secret image
    • Wang S.J. Steganography of capacity required using modulo operator for embedding secret image. Appl. Math. Comput. 164 (2005) 99-116
    • (2005) Appl. Math. Comput. , vol.164 , pp. 99-116
    • Wang, S.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.