An Improved Interpolation Method using Pixel Difference Values for Effective Reversible Data Hiding |
Kim, Pyung Han
(Dept. of Computer Science & Eng., Graduate School, Kyungpook National University)
Jung, Ki Hyun (Dept. of Computer Science, Kyungil University) Yoon, Eun-Jun (Dept. of Computer Science, Kyungil University) Ryu, Kwan-Woo (Dept. of Computer Science & Eng., Graduate School, Kyungpook National University) |
1 | C.F. Lee and Y.L. Huang, "An Efficient Image Interpolation Increasing Payload in Reversible Data Hiding," Expert Systems with Applications, Vol. 39, pp. 6712-6719, 2012. DOI |
2 | J.H. Lee, P.H. Kim, K.H. Jung, and K.Y. Yoo, "Information Hiding Method Based on Interpolation Using Max Difference of RGB Pixel for Color Images," Journal of Korea Multimedia Society, Vol. 20, No. 4, pp. 629-639, 2017. DOI |
3 | B. Jana, D. Giri, and S.K. Mondal, "Weighted Matrix Based Reversible Data Hiding Scheme Using Image Interpolation," Computer Intelligence in Data Mining, Vol. 2, pp. 239-248, 2016. |
4 | T.C. Lu, "Interpolation-based Hiding Scheme Using the Modulus Function and Re-encoding Strategy," Signal Processing, Vol. 142, pp. 244-259, 2018. DOI |
5 | K.H. Jung and K.Y. Yoo, "Data Hiding Method Using Image Interpolation," Computer Standards & Interfaces, Vol. 31, pp. 465-470, 2009. DOI |
6 | D.C. Wu and W.H. Tsai, "A Steganographic Method for Images by Pixel-value Differencing," Pattern Recognition Letters, Vol. 24, pp. 1613-1626, 2003. DOI |
7 | Z. Ni, Y.U.N.Q. Shi, N. Ansari and W.E.I. Su, "Reversible Data Hiding," IEEE Transactions on Circuits and System for Video Technology, Vol. 16, No. 3, pp. 354-362, 2006. DOI |
8 | P.H. Kim, K.Y. Ryu, and K.H. Jung, "Reversible Data Hiding Scheme Based on Pixelvalue Differencing in Dual Images," Distributed Sensor Networks, Vol. 16, No. 7, 2020. |
9 | J. Hu and T. Li, "Reversible Steganography Using Extended Image Interpolation Technique," Computers and Electrical Engineering, Vol. 46, pp. 447-455, 2015. DOI |
10 | S. Wang, Z. Cao, M.A. Strangio, and L. Wang, "Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol," IEEE Communications Letters, Vol. 12, No. 2, pp. 149-151, 2008. DOI |
11 | C.W. Leung, F.Y. Ng, and D.S. Wong, "On the Security of a Visual Cryptography Scheme for Color Images," Pattern Recognition, Vol. 42, No. 5, pp. 920-940, 2009 |
12 | W. Bender, D. Gruhl, N. Morimoto, Aiguo Lu, "Techniques for data hiding," IBM Systems Journal, Vol. 35, No. 3-4, pp. 313-336, 1996. DOI |
13 | N.F. Johnson, and S. Jajodia, "Exploring Steganography: Seeing the Unseen," Computer Practices, Vol. 31, No. 2, pp. 26-34, 1998. |
14 | F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, "Information Hiding - a Survey," Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, Vol. 7, No. 87, pp. 1062-1078, 1999. |
15 | C. Kurah and J.Mchughes, "A Cautionary Note on Image Downgrading," IEEE Computer Security Applications Conference, Vol. 2, 1992. |
16 | X.Li, J. Li, B. Li, and B. Yang, "High-fidelity Reversible Data Hiding Scheme Based on Pixel-value-ordering and Prediction-error expansion," Signal Process, Vol. 93, pp. 198-205, 2013. DOI |