2004
DOI: 10.1016/j.patrec.2004.05.006
|View full text |Cite
|
Sign up to set email alerts
|

A steganographic method for digital images using side match

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
128
0
1

Year Published

2005
2005
2014
2014

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 202 publications
(130 citation statements)
references
References 6 publications
1
128
0
1
Order By: Relevance
“…Wayner [45] dedicated a complete chapter in a book to what he called "life in noise", pointing to the usefulness of data embedding in noise. It is proven to be robust with respect to compression, cropping and image processing [41,61,62]. The model-based method (MB1), described in [58], generates a stego-image based on a given distribution model, using a generalized Cauchy distribution, that results in the minimum distortion.…”
Section: Adaptive Steganographymentioning
confidence: 99%
“…Wayner [45] dedicated a complete chapter in a book to what he called "life in noise", pointing to the usefulness of data embedding in noise. It is proven to be robust with respect to compression, cropping and image processing [41,61,62]. The model-based method (MB1), described in [58], generates a stego-image based on a given distribution model, using a generalized Cauchy distribution, that results in the minimum distortion.…”
Section: Adaptive Steganographymentioning
confidence: 99%
“…Larger PSNR values imply that the distortion between the cover image and stego−image is imperceptible to the human vision system (HVS). For evaluating the performance of our proposal three difference predictors [18], side match predic− tor [12,19], and JPEG−LS predictor [20] are used in the experiment. Figure 4 shows the position of the input pixel P(x, y) and its neighbour position in the images.…”
Section: Resultsmentioning
confidence: 99%
“…Hence, the LSB substitution scheme is not a good choice for embedding data in a smooth region. Thus, several new data hiding schemes are developed while keep− ing human eye sensitivity in mind [12][13][14][15][16][17].…”
Section: Introductionmentioning
confidence: 99%
“…Chang's [3] stego image respectively. Figure 2 (d), (e) and (f) show a histogram charting the difference between consecutive pixels of the cover image, our stego image and Chang's stego image respectively.…”
Section: Extracting and Verifying Of The Secret Informationmentioning
confidence: 99%
“…for effective image steganography. Therefore most steganographic methods [1,2,3,4] focus on these requirements, and the embedding and extracting algorithm etc. In steganograpahic system, however, the receiver, who received the massage, wants to know whether the extracted message has integrity or not.…”
Section: Introductionmentioning
confidence: 99%