2017
DOI: 10.5755/j01.itc.46.1.15253
|View full text |Cite
|
Sign up to set email alerts
|

A New Steganographic Algorithm Based on Multi Directional PVD and Modified LSB

Abstract: Steganographic techniques can be utilized to conceal data within digital images with small or invisible changes in the perceived appearance of the image. Generally, five main objectives are used to assess the performance of steganographic algorithms which include embedding capacity, imperceptibility, security, robustness and complexity. However, steganographic algorithms hardly take all of these factors into account. In this paper, a novel steganographic algorithm for digital images is proposed based on the pi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
20
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 54 publications
(25 citation statements)
references
References 48 publications
0
20
0
1
Order By: Relevance
“…x stands for the standard deviation of pixel values of original image, 2 y stands for the standard deviation of pixel values of stego image, and xy is the covariance between original image and stego image. Equations (17), (18), (19), (20), and (21) are used to calculate these values. Table 3 notes the results of seven-way PVD [18] which is an extension of Wu and Tsai's [1] technique.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…x stands for the standard deviation of pixel values of original image, 2 y stands for the standard deviation of pixel values of stego image, and xy is the covariance between original image and stego image. Equations (17), (18), (19), (20), and (21) are used to calculate these values. Table 3 notes the results of seven-way PVD [18] which is an extension of Wu and Tsai's [1] technique.…”
Section: Resultsmentioning
confidence: 99%
“…To prevent the detection from pixel difference histogram (PDH) analysis, multidirectional edges have been exploited in [18]. Darabkh et al [19] also proposed PVD steganography using eight-directional PVD which is an extension from Wu and Tsai's original PVD. A PVD steganography technique which is an extension of Wu and Tsai's PVD approach should be verified by PDH analysis.…”
Section: Introductionmentioning
confidence: 99%
“…Early image steganographic methods include the least significant bit (LSB) substitution method [1], which replaces the least significant bits of image pixels by secret messages, and the pixel value differencing (PVD) methods [2][3][4] that determine the amount of secret messages to be embedded in proportion to the difference between adjacent pixels. These early image steganographic methods sequentially embed secret messages into all pixels of an image, although they have been recently extended to embed messages in randomly selected pixels using pseudo-random generators for secure message hiding [5,6].…”
Section: Introductionmentioning
confidence: 99%
“…Computer applications have become an essential part of the educational process in almost every field . Science, mathematics, engineering, computer networking, medical specialties, and even literature are some of the fields which use computer programs in their courses to apply the skills taught theoretically in the class room in a practical way and to create a simulated environment which make the learning process more interactive, realistic, and even efficient compared to the old traditional methods .…”
Section: Introductionmentioning
confidence: 99%