Data Hiding Using Pixel-Value Modular Operation
![]() |
Byun, Jin-Yong
(School of Computer Science and Engineering, Kyungpook National University)
Kim, Pyung-Han (School of Computer Science and Engineering, Kyungpook National University) Lee, Joon-Ho (Agency for Defense Development) Jung, Ki-Hyun (Department of Cyber Security, Kyungil University) Yoo, Kee-Young (School of Computer Science and Engineering, Kyungpook National University) |
1 | D.S Kim, K.Y Yoo, “A novel Reversible Data Hiding Scheme based on Modulo Operation and Histogram Shifting,” Journal of Korea Multimedia Society, Vol. 15, No. 5, pp. 639-650, 2012. DOI ScienceOn |
2 | N.F. Johnson and S. Jajodia, "Exploring Steganography: Seeing the Unseen," Computer Practices, Vol. 31, No. 2, pp. 26-34, 1998. |
3 | K.H. Jung and K.Y. Yoo, “Data Hiding Method using Image Interpolation,” Computer Standards & Interfaces, Vol. 31, No. 2, pp. 465-470, 2009. DOI |
4 | F.A.P. Petitcolas, R.J. Anderson, and M.G, Kuhn, “Information Hiding-a Survey,” Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, Vol. 7, No. 87, pp. 1062-1078, 1999. |
5 | J. Zollner, H. Fedrrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, G. wolf, et al., “Modeling the Security of Steganographic Systems,” Lecture Notes in Computer Science, Vol. 1525, No.1, pp. 344-354, 1998. DOI |
6 | W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for Data Hiding,” IBM Systems Journal, Vol. 35, No. 3-4, pp. 313-336, 1996. DOI |
7 | R.J. Anderson and F.A.P. Petitcolas, “On The Limits of Steganography,” IEEE Journal of Selected Areas in Communications, Vol. 16, No. 4, pp. 474-481, 1998. DOI |
8 | K.H. Jung and K.Y. Yoo, “Improved Exploiting Modification Direction Method by Modulus Operation,” International Journal of Signal Processing, Image Processing and Pattern, Vol. 2, No. 1, pp. 79-88, 2009. |
9 | A.D. Ker, “Improved Detection of LSB Steganography in Grayscale Images,” Proceeding of the 6th International Conference on Information Hiding, pp. 97-115, 2004. |
10 | T. Sharp, “An Implementation of Key-based Digital Signal Steganography,” Proceeding of Information Hiding Workshop, pp. 13-26, 2001. |
11 | C.C. Chang, W.L. Tai, and N.N. Chen, “Improvements of EMD Embedding for Large Payloads,” Proceeding of the Interlligent Information Hiding and Multimedia Signal Processing, Vol. 1, pp. 474-476, 2007. |
12 | J. Mielikainen, “LSB Matching Revisited,” IEEE Signal Processing Letters, Vol. 13, No. 5, pp. 285-287, 2006. DOI ScienceOn |
13 | J. Wang, Y. Sun, H. Xu, K. Chen, H.J. Kim, S.H. Joo, et al., “An Improved Section-wise Exploiting Modification Direction Method,” Signal Processing, Vol. 90, No. 11, pp. 2954-2964, 2010. DOI |
14 | H. J Kwon, H.M Kim, S.J Kim, "A Data Hiding Scheme for Grayscale Images Using a Square Function." Journal of Korea Multimedia Society, Vol. 17, No. 4, pp. 466-477, 2014. DOI |
15 | X. Zhang and S. Wang, “Efficient Steganographic Embedding by Exploiting Modification Direction,” IEEE Communication Letters, Vol. 10, No. 11, pp. 781-783, 2006. DOI |
16 | C.F. Lee, Y.R. Wang, and C.C. Chang, “A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction,” Proceeding of the Interlligent Information Hiding and Multimedia Signal Processing, Vol. 1, pp. 497-500, 2007. |
17 | Z. Wang and A.C. Bovik, “A Universal Image Quality Index,” IEEE Signal Processing Letters, Vol. 3, No. 9, pp. 81-84, 2002. DOI |
![]() |