메뉴 건너뛰기




Volumn 7, Issue 1 PART 2, 2012, Pages 176-184

A novel data embedding method using adaptive pixel pair matching

Author keywords

Adaptive pixel pair matching (APPM); diamond encoding (DE); exploiting modification direction (EMD); least significant bit (LSB); optimal pixel adjustment process (OPAP); pixel pair matching (PPM)

Indexed keywords

DATA EMBEDDING METHODS; DATA-HIDING; EXPLOITING MODIFICATION DIRECTION (EMD); LEAST SIGNIFICANT BITS; NEIGHBORHOOD SET; OPTIMAL PIXEL ADJUSTMENT PROCESS (OPAP); PAIR MATCHING; REFERENCE COORDINATES; STEGANALYSIS;

EID: 84862908544     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2011.2155062     Document Type: Article
Times cited : (227)

References (24)
  • 2
    • 3042742327 scopus 로고    scopus 로고
    • Hide and seek: An introduction to steganography
    • May/Jun.
    • N. Provos and P. Honeyman, "Hide and seek: An introduction to steganography," IEEE Security Privacy, vol. 3, no. 3, pp. 32-44, May/Jun. 2003.
    • (2003) IEEE Security Privacy , vol.3 , Issue.3 , pp. 32-44
    • Provos, N.1    Honeyman, P.2
  • 3
    • 70350710022 scopus 로고    scopus 로고
    • Digital image steganography: Survey and analysis of current methods
    • A. Cheddad, J. Condell, K. Curran, and P. McKevitt, "Digital image steganography: Survey and analysis of current methods," Signal Process., vol. 90, pp. 727-752, 2010.
    • (2010) Signal Process. , vol.90 , pp. 727-752
    • Cheddad, A.1    Condell, J.2    Curran, K.3    McKevitt, P.4
  • 4
    • 77951871502 scopus 로고    scopus 로고
    • Minimizing embedding impact in steganography using trellis-coded quantization
    • DOI: 10.1117/12.838002
    • T. Filler, J. Judas, and J. Fridrich, "Minimizing embedding impact in steganography using trellis-coded quantization," in Proc. SPIE, Media Forensics and Security, 2010, vol. 7541, DOI: 10.1117/12.838002.
    • (2010) Proc. SPIE, Media Forensics and Security , vol.7541
    • Filler, T.1    Judas, J.2    Fridrich, J.3
  • 5
    • 33644999904 scopus 로고    scopus 로고
    • Steganalysis using higher-order image statistics
    • Mar.
    • S. Lyu and H. Farid, "Steganalysis using higher-order image statistics," IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 111-119, Mar. 2006.
    • (2006) IEEE Trans. Inf. Forensics Security , vol.1 , Issue.1 , pp. 111-119
    • Lyu, S.1    Farid, H.2
  • 7
    • 20444404178 scopus 로고    scopus 로고
    • Steganalysis of LSB matching in grayscale images
    • DOI 10.1109/LSP.2005.847889
    • A. D. Ker, "Steganalysis of LSB matching in grayscale images," IEEE Signal Process. Lett., vol. 12, no. 6, pp. 441-444, Jun. 2005. (Pubitemid 40794877)
    • (2005) IEEE Signal Processing Letters , vol.12 , Issue.6 , pp. 441-444
    • Ker, A.D.1
  • 8
    • 0346216907 scopus 로고    scopus 로고
    • Hiding data in images by simple LSB substitution
    • DOI 10.1016/j.patcog.2003.08.007
    • C. K. Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognit., vol. 37, no. 3, pp. 469-474, 2004. (Pubitemid 38003086)
    • (2004) Pattern Recognition , vol.37 , Issue.3 , pp. 469-474
    • Chan, C.-K.1    Cheng, L.M.2
  • 9
    • 33645814428 scopus 로고    scopus 로고
    • LSB matching revisited
    • May
    • J. Mielikainen, "LSB matching revisited," IEEE Signal Process. Lett., vol. 13, no. 5, pp. 285-287, May 2006.
    • (2006) IEEE Signal Process. Lett. , vol.13 , Issue.5 , pp. 285-287
    • Mielikainen, J.1
  • 10
    • 47349094397 scopus 로고    scopus 로고
    • Efficient steganographic embedding by exploiting modification direction
    • Nov.
    • X. Zhang and S. Wang, "Efficient steganographic embedding by exploiting modification direction," IEEE Commun. Lett., vol. 10, no. 11, pp. 781-783, Nov. 2006.
    • (2006) IEEE Commun. Lett. , vol.10 , Issue.11 , pp. 781-783
    • Zhang, X.1    Wang, S.2
  • 12
    • 67650187752 scopus 로고    scopus 로고
    • A novel image data hiding scheme with diamond encoding
    • DOI: 10.1155/2009/658047, Article ID 658047
    • R.M. Chao, H. C. Wu, C. C. Lee, and Y. P. Chu, "A novel image data hiding scheme with diamond encoding," EURASIP J. Inf. Security, vol. 2009, 2009, DOI: 10.1155/2009/658047, Article ID 658047.
    • (2009) EURASIP J. Inf. Security , vol.2009
    • Chao, R.M.1    Wu, H.C.2    Lee, C.C.3    Chu, Y.P.4
  • 13
    • 77955307852 scopus 로고    scopus 로고
    • An improved section-wise exploiting modification direction method
    • J. Wang, Y. Sun, H. Xu, K. Chen, H. J. Kim, and S. H. Joo, "An improved section-wise exploiting modification direction method," Signal Process., vol. 90, no. 11, pp. 2954-2964, 2010.
    • (2010) Signal Process. , vol.90 , Issue.11 , pp. 2954-2964
    • Wang, J.1    Sun, Y.2    Xu, H.3    Chen, K.4    Kim, H.J.5    Joo, S.H.6
  • 14
    • 36248978560 scopus 로고    scopus 로고
    • A double layered "Plus-minus one" data embedding scheme
    • DOI 10.1109/LSP.2007.903255
    • W. Zhang, X. Zhang, and S. Wang, "A double layered plus-minus one data embedding scheme," IEEE Signal Process. Lett., vol. 14, no. 11, pp. 848-851, Nov. 2007. (Pubitemid 350130777)
    • (2007) IEEE Signal Processing Letters , vol.14 , Issue.11 , pp. 848-851
    • Zhang, W.1    Zhang, X.2    Wang, S.3
  • 17
    • 33748096430 scopus 로고    scopus 로고
    • Matrix embedding for large payloads
    • Sep.
    • J. Fridrich and D. Soukal, "Matrix embedding for large payloads," IEEE Trans. Inf. Forensics Security, vol. 1, no. 3, pp. 390-394, Sep. 2006.
    • (2006) IEEE Trans. Inf. Forensics Security , vol.1 , Issue.3 , pp. 390-394
    • Fridrich, J.1    Soukal, D.2
  • 18
    • 42749096863 scopus 로고    scopus 로고
    • Inverted pattern approach to improve image quality of information hiding by LSB substitution
    • C. H. Yang, "Inverted pattern approach to improve image quality of information hiding by LSB substitution," Pattern Recognit., vol. 41, no. 8, pp. 2674-2683, 2008.
    • (2008) Pattern Recognit. , vol.41 , Issue.8 , pp. 2674-2683
    • Yang, C.H.1
  • 19
    • 77952641834 scopus 로고    scopus 로고
    • Steganalysis by subtractive pixel adjacency matrix
    • Jun
    • T. Pevný, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 215-224, Jun. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.2 , pp. 215-224
    • Pevný, T.1    Bas, P.2    Fridrich, J.3
  • 20
    • 79953028811 scopus 로고    scopus 로고
    • Statistical analysis of several reversible data hiding algorithms
    • DOI: 10.1007/s11042-009-0380-y
    • H. Zhao, H. Wang, and M. K. Khan, "Statistical analysis of several reversible data hiding algorithms," in Proc. Multimedia Tools and Applications, 2009, DOI: 10.1007/s11042-009-0380-y.
    • (2009) Proc. Multimedia Tools and Applications
    • Zhao, H.1    Wang, H.2    Khan, M.K.3
  • 21
    • 84862926837 scopus 로고    scopus 로고
    • UCID Image Database, [Online] Available:
    • UCID image database [Online]. Available: http://vision.cs.aston.ac.uk/ datasets/UCID/ucid.html
  • 22
    • 84862910887 scopus 로고    scopus 로고
    • RSP Image Database, [Online] Available:
    • RSP image database [Online]. Available: http://dud.inf.tu-dresden.de/ westfeld/rsp/rsp.html
  • 23
    • 79551690338 scopus 로고    scopus 로고
    • Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism
    • W. Hong and T. S. Chen, "Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism," J. Vis. Commun. Image Represent., vol. 22, no. 2, pp. 131-140, 2011.
    • (2011) J. Vis. Commun. Image Represent. , vol.22 , Issue.2 , pp. 131-140
    • Hong, W.1    Chen, T.S.2
  • 24
    • 84862910888 scopus 로고    scopus 로고
    • Implementation of the SPAM Features, [Online] Available:
    • Implementation of the SPAM features [Online]. Available: http://dde. binghamton.edu/download/spam/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.