메뉴 건너뛰기




Volumn 83, Issue 5, 2010, Pages 832-843

A novel data hiding scheme based on modulus function

Author keywords

Data hiding; Modulus operation; Steganography

Indexed keywords

CARTESIAN PRODUCTS; COLOR IMAGES; COMPUTATIONAL COSTS; DATA HIDING; DATA-EMBEDDING ALGORITHMS; EMBEDDING CAPACITY; EMBEDDING RATES; GRAY SCALE; GRAY-SCALE IMAGES; MAPPING PROCESS; MEMORY SPACE; MODULUS FUNCTIONS; PERFORMANCE CRITERION; SECRET DATA; SECRET KEY; STEGO IMAGE; TAKE-ALL; TIME COMPLEXITY; UNDERFLOWS; VISUAL QUALITIES;

EID: 77549088025     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2009.12.018     Document Type: Article
Times cited : (69)

References (18)
  • 1
    • 0346216907 scopus 로고    scopus 로고
    • Hiding data in images by simple LSB substitution
    • Chan C.K., and Cheng L.M. Hiding data in images by simple LSB substitution. Pattern Recognition 37 3 (2004) 469-474
    • (2004) Pattern Recognition , vol.37 , Issue.3 , pp. 469-474
    • Chan, C.K.1    Cheng, L.M.2
  • 2
    • 44049085895 scopus 로고    scopus 로고
    • Adaptive watermark mechanism for rightful ownership protection
    • Chang C.C., and Lin P.Y. Adaptive watermark mechanism for rightful ownership protection. Journal of Systems and Software 81 7 (2008) 1118-1129
    • (2008) Journal of Systems and Software , vol.81 , Issue.7 , pp. 1118-1129
    • Chang, C.C.1    Lin, P.Y.2
  • 3
    • 1442360452 scopus 로고    scopus 로고
    • Quantitative steganalysis of digital message: estimating the secret message length
    • Fridrich J., Goljan M., Hogea D., and Soukal D. Quantitative steganalysis of digital message: estimating the secret message length. Multimedia Systems 9 3 (2003) 288-302
    • (2003) Multimedia Systems , vol.9 , Issue.3 , pp. 288-302
    • Fridrich, J.1    Goljan, M.2    Hogea, D.3    Soukal, D.4
  • 4
    • 20444404178 scopus 로고    scopus 로고
    • Steganalysis of LSB matching in grayscale images
    • Ker A.D. Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters 12 6 (2005) 441-444
    • (2005) IEEE Signal Processing Letters , vol.12 , Issue.6 , pp. 441-444
    • Ker, A.D.1
  • 5
    • 62349115507 scopus 로고    scopus 로고
    • Data hiding in grayscale images by dynamic programming based on a human visual model
    • Lee I.S., and Tsai W.H. Data hiding in grayscale images by dynamic programming based on a human visual model. Pattern Recognition 42 7 (2009) 1604-1611
    • (2009) Pattern Recognition , vol.42 , Issue.7 , pp. 1604-1611
    • Lee, I.S.1    Tsai, W.H.2
  • 7
    • 0035148984 scopus 로고    scopus 로고
    • Digital watermarking models for resolving rightful ownership and authenticating legitimate customer
    • Lin P.L. Digital watermarking models for resolving rightful ownership and authenticating legitimate customer. Journal of Systems and Software 55 3 (2001) 261-271
    • (2001) Journal of Systems and Software , vol.55 , Issue.3 , pp. 261-271
    • Lin, P.L.1
  • 9
    • 33847159278 scopus 로고    scopus 로고
    • A robust content-based digital image watermarking scheme
    • Qi X., and Qi J. A robust content-based digital image watermarking scheme. Signal Processing 87 6 (2007) 1264-1280
    • (2007) Signal Processing , vol.87 , Issue.6 , pp. 1264-1280
    • Qi, X.1    Qi, J.2
  • 10
    • 34548561714 scopus 로고    scopus 로고
    • Human visual system based adaptive digital image watermarking
    • Qi H., Zheng D., and Zhao J. Human visual system based adaptive digital image watermarking. Signal Processing 88 1 (2008) 174-188
    • (2008) Signal Processing , vol.88 , Issue.1 , pp. 174-188
    • Qi, H.1    Zheng, D.2    Zhao, J.3
  • 11
    • 33846637734 scopus 로고    scopus 로고
    • A novel data hiding scheme for color images using a BSP tree
    • Tsai Y.Y., and Wang C.M. A novel data hiding scheme for color images using a BSP tree. The Journal of Systems and Software 80 3 (2007) 429-437
    • (2007) The Journal of Systems and Software , vol.80 , Issue.3 , pp. 429-437
    • Tsai, Y.Y.1    Wang, C.M.2
  • 12
    • 11844252006 scopus 로고    scopus 로고
    • Cyber warfare: steganography vs. steganalysis
    • Wang H., and Wang S. Cyber warfare: steganography vs. steganalysis. Communication of the ACM 47 10 (2004) 76-82
    • (2004) Communication of the ACM , vol.47 , Issue.10 , pp. 76-82
    • Wang, H.1    Wang, S.2
  • 13
    • 0035283377 scopus 로고    scopus 로고
    • Image hiding by optimal LSB substitution and genetic algorithm
    • Wang R.Z., Lin C.F., and Lin J.C. Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition 34 3 (2001) 671-683
    • (2001) Pattern Recognition , vol.34 , Issue.3 , pp. 671-683
    • Wang, R.Z.1    Lin, C.F.2    Lin, J.C.3
  • 14
    • 35848929919 scopus 로고    scopus 로고
    • A high quality steganographic method with pixel-value differencing and modulus function
    • Wang C.M., Wu N.I., Tsai C.S., and Hwang M.S. A high quality steganographic method with pixel-value differencing and modulus function. Journal of Systems and Software 81 1 (2008) 150-158
    • (2008) Journal of Systems and Software , vol.81 , Issue.1 , pp. 150-158
    • Wang, C.M.1    Wu, N.I.2    Tsai, C.S.3    Hwang, M.S.4
  • 16
    • 27144475598 scopus 로고    scopus 로고
    • Image steganographic scheme based on pixel-value differencing and LSB replacement methods
    • Wu H.C., Wu N.I., Tsai C.S., and Hwang M.S. Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Vision, Image and Signal Processing 152 5 (2005) 611-615
    • (2005) IEE Vision, Image and Signal Processing , vol.152 , Issue.5 , pp. 611-615
    • Wu, H.C.1    Wu, N.I.2    Tsai, C.S.3    Hwang, M.S.4
  • 17
    • 47549119250 scopus 로고    scopus 로고
    • An embedding technique based upon block prediction
    • Wu M.N., Lin C.C., and Chang C.C. An embedding technique based upon block prediction. Journal of Systems and Software 81 9 (2008) 1505-1516
    • (2008) Journal of Systems and Software , vol.81 , Issue.9 , pp. 1505-1516
    • Wu, M.N.1    Lin, C.C.2    Chang, C.C.3
  • 18
    • 47349094397 scopus 로고    scopus 로고
    • Efficient steganographic embedding by exploiting modification direction
    • Zhang X., and Wang S. Efficient steganographic embedding by exploiting modification direction. IEEE Communications Letters 10 11 (2006) 781-783
    • (2006) IEEE Communications Letters , vol.10 , Issue.11 , pp. 781-783
    • Zhang, X.1    Wang, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.