A New Method of Coding for Steganography Based on LSB Matching Revisited

作者: Mohsen Rezvani , Mansoor Fateh , Yasser Irani

DOI: 10.1155/2021/6610678

关键词: SteganographyArtificial intelligenceCoding (social sciences)Computer scienceLsb matchingPattern recognition

摘要:

参考文章(32)
Andreas Westfeld, F5-A Steganographic Algorithm information hiding. ,vol. 2137, pp. 289- 302 ,(2001) , 10.1007/3-540-45496-9_21
Gandharba Swain, Adaptive pixel value differencing steganography using both vertical and horizontal edges Multimedia Tools and Applications. ,vol. 75, pp. 13541- 13556 ,(2016) , 10.1007/S11042-015-2937-2
Anjali A. Shejul, U.L. Kulkarni, A DWT Based Approach for Steganography Using Biometrics data storage and data engineering. pp. 39- 43 ,(2010) , 10.1109/DSDE.2010.10
Pooja Rai, Sandeep Gurung, M.K. Ghose, Analysis of Image Steganography Techniques: A Survey International Journal of Computer Applications. ,vol. 114, pp. 11- 17 ,(2015) , 10.5120/19941-1731
Chi-Kwong Chan, L.M. Cheng, Hiding data in images by simple LSB substitution Pattern Recognition. ,vol. 37, pp. 469- 474 ,(2004) , 10.1016/J.PATCOG.2003.08.007
H.-C. Wu, N.-I. Wu, C.-S. Tsai, M.-S. Hwang, Image steganographic scheme based on pixel-value differencing and LSB replacement methods IEE Proceedings - Vision, Image, and Signal Processing. ,vol. 152, pp. 611- 615 ,(2005) , 10.1049/IP-VIS:20059022
Cuiling Jiang, Yilin Pang, Shun Xiong, A High Capacity Steganographic Method Based on Quantization Table Modification and F5 Algorithm Circuits Systems and Signal Processing. ,vol. 33, pp. 1611- 1626 ,(2014) , 10.1007/S00034-013-9703-3
Guangjie Liu, Zhan Zhang, Yuewei Dai, Shiguo Lian, Improved LSB-matching Steganography for Preserving Second-order Statistics Journal of Multimedia. ,vol. 5, pp. 458- 463 ,(2010) , 10.4304/JMM.5.5.458-463
R.J. Anderson, F.A.P. Petitcolas, On the limits of steganography IEEE Journal on Selected Areas in Communications. ,vol. 16, pp. 474- 481 ,(1998) , 10.1109/49.668971
N. Provos, P. Honeyman, Hide and seek: an introduction to steganography ieee symposium on security and privacy. ,vol. 1, pp. 32- 44 ,(2003) , 10.1109/MSECP.2003.1203220