Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 11
Page No. 3754 - 3760

Adaptive Least-Significant-Bit Substitution Applied in Data Hiding Structure for RGB Image

Authors : Hussain A. Younis, Issa Ahmed Abed, Isra`a M. Hayder and Hameed Abdul-Kareem Younis

References

Abduallah, W.M., A.M.S. Rahma and A.S.K. Pathan, 2014. Mix column transform based on irreducible polynomial mathematics for color image steganography: A novel approach. Comput. Electr. Eng., 40: 1390-1404.
CrossRef  |  Direct Link  |  

Bender, W., D. Gruhl, N. Morimoto and A. Lu, 1996. Techniques for data hiding. IBM. Syst. J., 35: 313-336.
CrossRef  |  Direct Link  |  

Bender, W., W. Butera, D. Gruhl, R. Hwang, F.J. Paiz and S. Pogreb, 2000. Applications for data hiding. IBM Syst. J., 39: 547-568.
CrossRef  |  Direct Link  |  

Chugh, G., 2013. Information hiding-steganography & watermarking: A comparitive study. Intl. J. Adv. Res. Comput. Sci., 4: 165-171.
Direct Link  |  

El_Rahman, S.A., 2015. A comprehensive image steganography tool using LSB scheme. Intl. J. Image, Graphics Signal Process., 7: 10-18.
CrossRef  |  Direct Link  |  

El_Rahman, S.A., 2018. A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information. Comput. Electr. Eng., 70: 380-399.
CrossRef  |  Direct Link  |  

Karzenbeisser, S. and F.A.P. Perircolas, 2000. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, UK., ISBN: 9781580530354, Pages: 220.

Marvel, L.M., 2000. Image steganography for hidden communication. Master Thesis, United States Army Research Laboratory, Maryland, USA.

Marvel, L.M., C.G. Boncelet and C.T. Retter, 1999. Spread spectrum image steganography. IEEE Trans. Image Process., 8: 1075-1083.
CrossRef  |  Direct Link  |  

Orebaugh, A.D., 2013. Steganalysis: A steganography intrusion detection system. J. Steganography, 1: 1-21.
Direct Link  |  

Petitcolas, F.A.P., R.J. Anderson and M.G. Kuhn, 1999. Information hiding-a survey. Proc. IEEE, 87: 1062-1078.
CrossRef  |  Direct Link  |  

Shih, F.Y., 2017. Digital Watermarking and Steganography: Fundamentals and Techniques. 2nd Edn., CRC Press, New York, USA., ISBN:9781498738774, Pages: 292.

Singh, G. and N. Kaur, 2017. Encryption of Medical Images with Steganography Method. Imperial J. Interdiscip. Res., 3: 1090-1094.
Direct Link  |  

Swanson, M.D., M. Kobayashi and A.H. Tewfik, 1998. Multimedia data embedding and watermarking technologies. Proc. IEEE, 86: 1064-1087.
CrossRef  |  Direct Link  |  

Voyatzis, G., N. Nikolaidis and I. Pitas, 1998. Digital watermarking: An overview. Proceedings of the 9th European Conference on Signal Processing Conference (EUSIPCO 1998), September 8-11, 1998, IEEE, Rhodes, Greece, ISBN:978-960-7620-06-4, pp: 1-4.

Wolfgang, R.B. and E.J. Delp, 1999. Fragile watermarking using the VW2D watermark. Proceedings of the SPIE Security and Watermarking of Multimedia Contents, Volume 3657, January 23, 1999, San Jose, CA., USA., pp: 204-213.

Wolfgang, R.B., C.I. Podilchuk and E.J. Delp, 1999. Perceptual watermarks for digital images and video. Proc. IEEE, 87: 1108-1126.
Direct Link  |  

Yadav, R., 2011. Study of information hiding techniques and their counterattacks: A review article. Intl. J. Comput. Sci. Commun. Netw., 1: 142-164.

Yu, Y.H., C.C. Chang and I.C. Lin, 2007. A new steganographic method for color and grayscale image hiding. Comput. Vision Image Understanding, 107: 183-194.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved