JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Inverse Operation-based Image Steganography using Side Match for Minimum Data Damage
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Inverse Operation-based Image Steganography using Side Match for Minimum Data Damage
Che, Won-Seok; Chung, Kyung-Ho; Kim, Sung-Soo; Yun, Tae-Jin; Han, Ki-Jun;
  PDF(new window)
 Abstract
The Streganography method for digital images has to insert secret data into the image without image distortion. Side match method is that size of secret data is calculated by difference of embedded pixel value and mean value of side pixels. And the secret value is embedded into the embedded pixel. Therefore, the more secret data increases, the more image distortion increases, too. In this paper, we propose the enhanced method that calculates embedded pixel value by difference of secret value and mean value of side pixels. In proposed method, more secret data is embedded and image distortion has to decreases.
 Keywords
Steganography;Digital image;Side match;security;
 Language
Korean
 Cited by
 References
1.
C.C.Chang and H.W.Tseng, "A Steganographic Method for Digital Images using Side Match," Pattern Recognition Letters, Vol. 25, Issue 12, pp. 1431-1437, September 2004. crossref(new window)

2.
C.C.Chang, C.Y.Lin and Y.Z.Wang, "New Image Steganographic Methods using Run-length Approach," INFORMATION SCIENCES, February 2006.

3.
A. Martin, G. Sapiro and G. Seroussi, "Is Image Steganography Natural?," IEEE TRANSACTIONS ON IMAGE PROCESSING, Vol. 14, No. 12, December 2005.

4.
P. Chen, W. Wu, "A Modified Side Match Scheme for Image Steganography," International Jounal of Applied Science and Engineering, Vol. 7(1), pp. 53-60, October 2009.

5.
G. Swain, S. K. Lenka, "Steganography using two sided, three sided, and four sided side match methods," CSI Transactions on ICT, Vol. 1, Issue 2, pp. 127-133, June 2013. crossref(new window)

6.
G. Swain, "Steganography in Digital Images Using Maximum Difference of Neighboring Pixel Values," International Journal of Security and Its Applications, Vol. 7, No. 6, pp. 285-294, 2013. crossref(new window)

7.
M. A. B. Younis, and A. Jantan, "A New Steganography Approach for Image Encryption Exchange by Using Least Significant Bit Insertion," International Journal of Computer Science and Network Security, Vol. 8, No. 6, 2008.

8.
M. Juneja, P. S. Sandhu, and E. Walia, "Application of LSB Based Steganographic Technique for 8-bit Color Images," Proceedings of World Academy of Science, Engineering and Technology, Vol. 38, pp. 427-429, 2009.

9.
M. Amiri, and M. R. Resketi, "An Edge Method in Steganography," Proceedings of World Academy of Science, Engineering and Technology, Vol. 37, pp. 1058-1063, 2009.

10.
S. Arora, and S. Anand, "A New Approach for Image Steganography using Edge Detection Method," International Journal of Innovative Research in Computer and Communication Engineering, Vol. 1, Issue 3, May 2013.

11.
G. Yim, and H. Kim, "Chaos-based Image Encryption Scheme using Noise-induced Synchronization," Journal of the Korea Society of Computer and Information, Vol. 13, No. 5, pp. 155-162, September 2008.

12.
H. Yang, and J. Choi, "Study on the Correlation between Digital Images using ICOR," Journal of the Korea Society of Computer and Information, Vol. 14, No. 3, pp. 75-82, March 2009.