2018
DOI: 10.1016/j.jisa.2018.10.006
|View full text |Cite
|
Sign up to set email alerts
|

Steganography with pixel-value differencing and modulus function based on PSO

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(30 citation statements)
references
References 11 publications
0
29
0
1
Order By: Relevance
“…The proposed method is compared with popular counterparts spatial PVD-based steganography methods, including Wu and Tsai [11], Wu et al [54], Wang et al [18], Yang et al [19], Liao et al [20], Hussain et al [14], and Li and He [25]. These methods are all spatial domains based on the PVD technique similar to the proposed method.…”
Section: E Comparison With the State-of-the-art 1) Comparison With Pvd-based Steganography Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed method is compared with popular counterparts spatial PVD-based steganography methods, including Wu and Tsai [11], Wu et al [54], Wang et al [18], Yang et al [19], Liao et al [20], Hussain et al [14], and Li and He [25]. These methods are all spatial domains based on the PVD technique similar to the proposed method.…”
Section: E Comparison With the State-of-the-art 1) Comparison With Pvd-based Steganography Methodsmentioning
confidence: 99%
“…The selective property of the proposed method not only improves the visual quality of the stego image but also increases the embedding capacity. Additionally, Li and He [25] proposed a data hiding algorithm using PVD, modulus function and particle swarm optimization to improve embedding capacity and visual quality.…”
Section: Related Workmentioning
confidence: 99%
“…For example, capacity improvement generally has a negative influence on invisibility Public key steganography: like in cryptography, A uses the public key of B when it wants to send a message to it. B extract with its private key [8] (Figure 4).…”
Section: Steganography Characteristicsmentioning
confidence: 99%
“…In recent years, many studies have been conducted to improve the capacity, safety and stego image quality using PVD-based methods [31][32][33][34][35][36]. In the article, GUI which makes it easy to hide the data in the agricultural databases to cover images and extract the hidden data from the stego image was designed to effectively use image steganography in the field of agriculture.…”
Section: Introductionmentioning
confidence: 99%