Block Based Image Steganography in Spatial and Frequency Domain
V. Nagaraj, V. Vijayalakshmi, and G. Zayaraz, “Overview of Digital Steganography Methods and Its Applications,” Int. J. Adv. Sci. Technol., vol. 60, pp. 45–58, 2013.
I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography. Morgan Kaufmann, 2007.
H.-W. Tseng and C.-C. Chang, “High capacity data hiding in JPEG-compressed images,” Informatica, vol. 15, no. 1, pp. 127–142, 2004.  E. Ghasemi, J. Shanbehzadeh, and N. Fassihi, “High capacity image steganography using wavelet transform and genetic algorithm,” in Proceedings of international multiconference of engineers and computer scientists, 2011, vol. 1, pp. 16–18.
S. Ahani and S. Ghaemmaghami, “Colour image steganography method based on sparse representation,” IET Image Process., vol. 9, no. 6, pp. 496–505, 2015.
S. Sarreshtedari and S. Ghaemmaghami, “High Capacity Image Steganography in Wavelet Domain,” in 2010 7th IEEE Consumer Communications and Networking Conference (CCNC), 2010, pp. 1–5.
D. E. Walia, P. Jain, and N. Navdeep, “An Analysis of LSB & DCT based Steganography,” Glob. J. Comput. Sci. Technol., vol. 10, no. 1, May 2010.
D. Bandyopadhyay, K. Dasgupta, J. K. Mandal, and P. Dutta, “A Novel Secure Image Steganography Method Based on Chaos Theory in Spatial Domain,” Int. J. Secur., 2014.
A. Singh and H. Singh, “An improved LSB based image steganography technique for RGB images,” in 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), 2015, pp. 1–4.
B. Debnath, J. C. Das, and D. De, “Reversible logic-based image steganography using quantum dot cellular automata for secure nanocommunication,” IET Circuits Devices Syst., vol. 11, no. 1, pp. 58–67, 2017.
J. Bai, C.-C. Chang, T.-S. Nguyen, C. Zhu, and Y. Liu, “A high payload steganographic algorithm based on edge detection,” Displays, vol. 46, pp. 42–51, Jan. 2017.
Shreyank N Gowda, “Block Based Least Significant Bit Algorithm for Image Steganography,” presented at the Annual Int’l Conference on Intelligent Computing, Computer Science & Information Systems, Thailand, 2016.
A. Nag, S. Ghosh, S. Biswas, D. Sarkar, and P. P. Sarkar, “An image steganography technique using X-box mapping,” in 2012 International Conference on Advances in Engineering, Science and Management (ICAESM), 2012, pp. 709–713.
S. Sharma, V. K. Yadav, and S. Batham, “Zero Distortion Technique: An Approach to Image Steganography Using Strength of Indexed Based Chaotic Sequence,” in Security in Computing and Communications, Springer Berlin Heidelberg, 2014, pp. 407–416.
Shivani, V. K. Yadav, and S. Batham, “A Novel Approach of Bulk Data Hiding using Text Steganography,” Procedia Comput. Sci., vol. 57, pp. 1401–1410, Jan. 2015.
B. S. and K. L. Sudha, “Text Steganography using LSB insertion method along with Chaos Theory,” ArXiv12051859 Cs, May 2012.
Y. Wang, W. Chen, Y. Li, W. Wang, and C. T. Li, “HPS: Histogram preserving steganography in spatial domain,” in 2014 International Workshop on Biometrics and Forensics (IWBF), 2014, pp. 1–4.
S. E. Jero and P. Ramu, “Curvelets-based ECG steganography for data security,” Electron. Lett., vol. 52, no. 4, pp. 283–285, 2016.
Yusra A. Y. Al-Najjar, Dr. Der Chen Soong “Comparison of Image Quality Assessment: PSNR, HVS, SSIM, UIQI” in International Journal of Scientific & Engineering Research, Volume 3, Issue 8, August-2017
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.