Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 11
Page No. 4235 - 4244

Image Steganography Technique Based on Extracted Chains from the Secret Key

Authors : Mohammed Abbas Fadhil Al-Husainy and Diaa Mohammed Uliyan

References

Abhiram, M.V., S. Imadabathuni, U. Padmalochini, M. Imadabathuni and R. Ramnath, 2009. Pixel intensity based steganography with improved randomness. Intl. J. Comput. Sci. Inf. Technol., 2: 169-173.

Al-Asmari, A.K., M.A. Al-Qodah and A.S. Salama, 2011. Wavelet-pixel value differencing technique for digital images data hiding. Proceedings of the 2011 IEEE International Conference on System Engineering and Technology (ICSET’11), June 27-28, 2011, IEEE, Shah Alam, Malaysia, ISBN:978-1-4577-1256-2, pp: 15-18.

Amir, F.N. and A.R.N. Nilchi, 2013. Steganography on RGB images based on a matrix pattern using random blocks. Intl. J. Modern Educ. Comput. Sci., 5: 8-18.
CrossRef  |  

Avcibas, I., M. Kharrazi, N. Memon and B. Sankur, 2005. Image steganalysis with binary similarity measures. EURASIP J. Appl. Signal Processing, 2005: 2749-2757.
CrossRef  |  Direct Link  |  

Avcibas, I., M. Nasir and B. Sankur, 2001. Steganalysis of watermarking techniques using image quality metrics. Proceedings of the SPIE Conference on Security and Watermarking of Multimedia Contents III, Volume 4314, January 21-26, 2001, San Jose, USA., pp: 525-531.

Cheddad, A., J. Condell, K. Curran and P. McKevitt, 2010. Digital image steganography: Survey and analysis of current methods. Signal Process., 90: 727-752.
CrossRef  |  Direct Link  |  

Chen, P.Y. and H.J. Lin, 2006. A DWT based approach for image steganography. Int. J. Applied Sci. Eng., 4: 275-290.
Direct Link  |  

Desai, M.B. and S.V. Patel, 2014. Survey on universal image steganalysis. Intl. J. Comput. Sci. Inf. Technol., 5: 4752-4759.
Direct Link  |  

Farid, H., 2002. Detecting hidden messages using higher-order statistical models. Proceedings of the 2002 International Conference on Image Processing, September 22-25, 2002, IEEE, Rochester, New York, USA., pp: II-905-II-908.

Fridrich, J., M. Goljan and R. Du, 2001. Detecting LSB steganography in color and gray-scale images. IEEE Multimedia, 8: 22-28.
CrossRef  |  Direct Link  |  

Fridrich, J., T. Pevny and J. Kodovsky, 2007. Statistically undetectable jpeg steganography: Dead ends challenges and opportunities. Proceedings of the 9th Workshop on Multimedia and Security, September 20-21, 2007, ACM, Dallas, Texas, USA., ISBN: 978-1-59593-857-2, pp: 3-14.

Gul, G. and F. Kurugollu, 2010. SVD-based universal spatial domain image steganalysis. Trans. Inform. Foren. Sec., 5: 349-353.
CrossRef  |  Direct Link  |  

Gutub, A.A.A., 2010. Pixel indicator technique for RGB image steganography. J. Emerg. Technol. Web Intell., 2: 56-64.
CrossRef  |  Direct Link  |  

Hamid, N., A. Yahya, R.B. Ahmad and O.M. Al-Qershi, 2012. Image steganography techniques: An overview. Intl. J. Comput. Sci. Secur., 6: 168-187.
Direct Link  |  

Han, D., J. Yang and W. Summers, 2017. Inject stenography into cybersecurity education. Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA’17), March 27-29, 2017, IEEE, Taipei, Taiwan, ISBN:978-1-5090-6232-4, pp: 50-55.

Husainy, M.A.F., 2012. Message segmentation to enhance the security of LSB image Steganography. Int. J. Adv. Comput. Sci. Applic., 3: 57-62.

Kaur, S., A. Kaur and K. Singh, 2014. A survey of image steganography. Intl. J. Rev. Electron. Commun. Eng., 2: 102-105.

Lu, C.S., 2004. Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property. Idea Group Publishing, Hershey, PA., pp: 207-230.

Luo, W., F. Huang and J. Huang, 2010. Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inform. Forensics Secur., 5: 201-214.
CrossRef  |  

Mandal, J.K. and D. Das, 2012. Steganography using Adaptive Pixel Value Differencing (APVD) of gray images through exclusion of overflow/underflow. Cryptography Secur., 1: 1-9.
CrossRef  |  Direct Link  |  

Manjula, Y. and K.B. Shivakumar, 2016. Enhanced secure image steganography using double encryption algorithms. Proceedings of the 3rd International Conference on Computing for Sustainable Global Development (INDIACom’16), March 16-18, 2016, IEEE, New Delhi, India, ISBN:978-1-4673-9417-8, pp: 705-708.

Purohit, A. and P.S.V.S. Sridhar, 2014. Image steganography: A review. Intl. J. Comput. Sci. Inf. Technol., 5: 4891-4896.
Direct Link  |  

Qian-Lan, D., 2010. The blind detection of information hiding in color image. Proceedings of the 2nd International Conference on Computer Engineering and Technology (ICCET’10) Vol. 7, April 16-18, 2010, IEEE, Chengdu, China, ISBN:978-1-4244-6347-3, pp: V7-346-V7-348.

Rana, R. and D. Singh, 2010. Steganography-concealing messages in images using LSB replacement technique with pre-determined random pixel and segmentation of image. Intl. J. Comput. Sci. Commun., 1: 113-116.
Direct Link  |  

Roy, R., A. Sarkar and S. Changder, 2013. Chaos based edge adaptive image steganography. Procedia Technol., 10: 138-146.

Saidi, M., H. Hermassi, R. Rhouma and S. Belghith, 2017. A new adaptive image steganography scheme based on DCT and chaotic map. Multimedia Tools Appl., 76: 13493-13510.
Direct Link  |  

Saqer, W. and T. Barhoom, 2016. Steganography and hiding data with indicators-based LSB using a secret key. Eng. Technol. Appl. Sci. Res., 6: 1013-1017.
Direct Link  |  

Sarreshtedari, S. and S. Ghaemmaghami, 2010. High capacity image steganography in wavelet domain. Proceedings of the 7th IEEE Conference on Consumer Communications and Networking (CCNC’10), January 9-12, 2010, IEEE, Las Vegas, Nevada, ISBN:978-1-4244-5175-3, pp: 1-5.

Sharma, V.K. and D.K. Srivastava, 2017. Comprehensive data hiding technique for discrete wavelet transform-based image steganography using advance encryption standard. Proceedings of the International IRSCNS 2016 Conference on Computing and Network Sustainability, July 6, 2016, Springer, Singapore, ISBN:978-981-10-3934-8, pp: 353-360.

Singh, A., S.K. Dhanda and R. Kaur, 2014. Secure image steganography using n-queen puzzle and its comparison with LSB technique. Intl. J. Innov. Technol., 3: 4-8.
Direct Link  |  

Subhedar, M.S. and V.H. Mankar, 2014. Current status and key issues in image steganography: A survey. Comput. Sci. Rev., 13-14: 95-113.
CrossRef  |  Direct Link  |  

Sumathi, C.P., T. Santanam and G. Umamaheswari, 2014. A study of various steganographic techniques used for information hiding. Intl. J. Comput. Sci. Eng. Surv., 4: 9-25.
CrossRef  |  Direct Link  |  

Sun, Z., H. Li, Z. Wu and Z. Zhou, 2009. An image steganalysis method based on characteristic function moments of wavelet subbands. Proceedings of the 2009 International Conference on Artificial Intelligence and Computational Intelligence (AICI'09), Vol. 1, November 7-8, 2009, IEEE, Shanghai, China, ISBN:978-1-4244-3835-8, pp: 291-295.

Swain, G., 2016. Adaptive pixel value differencing steganography using both vertical and horizontal edges. Multimedia Tools Appl., 75: 13541-13556.
Direct Link  |  

Thiyagarajan, P., G. Aghila and V. Venkatesan, 2010. Dynamic pattern based image steganography. J. Comput., 2: 1-9.
Direct Link  |  

Tiwari, N., M. Sandilya and M. Chawla, 2014. Spatial domain image steganography based on security and randomization. Intl. J. Adv. Comput. Sci. Appl., 5: 156-159.
Direct Link  |  

Trivedi, M.C., S. Sharma and V.K. Yadav, 2016. Analysis of several image steganography techniques in spatial domain: A survey. Proceedings of the 2nd International Conference on Information and Communication Technology for Competitive Strategies, March 4-5, 2016, ACM, Udaipur, India, ISBN:978-1-4503-3962-9, pp: 84:1-84:7.

Wu, D.C. and W.H. Tsai, 2003. A steganographic method for images by pixel-value differencing. Pattern Recognit. Lett., 24: 1613-1626.
CrossRef  |  Direct Link  |  

Xuan, G., Y.Q. Shi, J. Gao, D. Zou and C. Yang et al., 2005. Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. Proceedings of the 7th International Workshop on Information Hiding (IH, 05), June 6-8, 2005, Springer, Barcelona, Spain, ISBN:978-3-540-29039-1, pp: 262-277.

Yadav, R.M., D.D.S. Tomar and D.R. Baghel, 2014. A study on image steganography approaches in digital images. Eng. Universe Sci. Res. Manage., 6: 1-6.
Direct Link  |  

Yan, Y., L. Li and Q. Zhang, 2013. Universal steganalysis method based on multi-domain features. J. Inf. Comput. Sci., 10: 2177-2185.

Yang, C.Y. and W.F. Wang, 2015. Block-based colour image steganography using smart pixel-adjustment. Proceedings of the 8th International Conference on Genetic and Evolutionary Computing, October 18-20, 2014, Springer, Nanchang, China, ISBN 978-3-319-12285-4, pp: 145-154.

Zou, D., Y.Q. Shi, W. Su and G. Xuan, 2006. Steganalysis based on Markov model of thresholded prediction-error image. Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, July 9-12, 2006, IEEE, Toronto, Ontario, ISBN:1-4244-0366-7, pp: 1365-1368.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved