Quantization selection based on characteristic of cover image for PVD Steganography to optimize imperceptibility and capacity

Pulung Nurtantio Andono1, De Rosal Ignatius Moses Setiadi1
1Department of Informatics Engineering, Dian Nuswantoro University, 50131, Semarang, Indonesia

Tóm tắt

Từ khóa


Tài liệu tham khảo

Abdel Hameed M, Aly S, Hassaballah M (2018) An efficient data hiding method based on adaptive directional pixel value differencing (ADPVD). Multimed Tools Appl 77:14705–14723. https://doi.org/10.1007/s11042-017-5056-4

Alharan AFH, Fatlawi HK, Ali NS (2019) A cluster-based feature selection method for image texture classification. Indones J Electr Eng Comput Sci 14:1433–1442. https://doi.org/10.11591/ijeecs.v14.i3.pp1433-1442

Dias PA, Tabb A, Medeiros H (2018) Multispecies fruit flower detection using a refined semantic segmentation network. IEEE Robot Autom Lett 3:3003–3010. https://doi.org/10.1109/LRA.2018.2849498

Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color and gray-scale images. IEEE Multimed 8:22–28. https://doi.org/10.1109/93.959097

Grover R, Yadav DK, Chauhan DK, Kamya S (2018) Adaptive steganography via image complexity analysis using 3D color texture feature. In: 3rd International Conference on Innovative Applications of Computational Intelligence on Power, Energy and Controls with their Impact on Humanity, CIPECH 2018. Institute of Electrical and Electronics Engineers Inc., Ghaziabad, pp 125–129

Hameed MA, Hassaballah M, Aly S, Awad AI (2019) An adaptive image steganography method based on histogram of oriented gradient and PVD-LSB techniques. IEEE Access 7:185189–185204. https://doi.org/10.1109/ACCESS.2019.2960254

Hussain M, Abdul Wahab AW, Ho ATS et al (2017) A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Process Image Commun 50:44–57. https://doi.org/10.1016/j.image.2016.10.005

Images - Google Drive. https://drive.google.com/drive/u/0/folders/1JrRPz9ZVj54Pvo-sZMEX1CqgiAfibKjZ. Accessed 6 Apr 2022

Irawan C, Ardyastiti EN, Setiadi DRIM et al (2018) A Survey: Effect of the number of GLCM features on classification accuracy of Lasem Batik Images using K-Nearest Neighbor. International seminar on research of information technology and intelligent systems. IEEE, Yogyakarta, pp 33–38

Kaur G, Singh S, Rani R, Kumar R (2020) A comprehensive study of Reversible Data Hiding (RDH) schemes based on Pixel Value Ordering (PVO). Springer Netherlands

Kavzoglu T (2009) Increasing the accuracy of neural network classification using refined training data. Environ Model Softw 24:850–858. https://doi.org/10.1016/j.envsoft.2008.11.012

Krishna R, Kumar K (2020) P-MEC: Polynomial congruence based Multimedia Encryption technique over Cloud. IEEE Consum Electron Mag 2248:1–6. https://doi.org/10.1109/MCE.2020.3003127

Kumar R, Chand S, Singh S (2018) An Improved Histogram-Shifting-Imitated reversible data hiding based on HVS characteristics. Multimed Tools Appl 77:13445–13457. https://doi.org/10.1007/s11042-017-4960-y

Kumar R, Chand S, Singh S (2018) A reversible data hiding scheme using pixel location. Int Arab J Inf Technol 15:763–768

Kumar R, Kim DS, Jung KH (2019) Enhanced AMBTC based data hiding method using hamming distance and pixel value differencing. J Inf Secur Appl 47:94–103. https://doi.org/10.1016/j.jisa.2019.04.007

Lee YP, Lee JC, Chen WK et al (2012)High-payload image hiding with quality recovery using tri-way pixel-value differencing. Inf Sci (Ny) 191:214–225. https://doi.org/10.1016/j.ins.2012.01.002

Lee CF, Weng CY, Chen KC (2017) An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection. Multimed Tools Appl 76:9993–10016. https://doi.org/10.1007/s11042-016-3591-z

Li Z, He Y (2018) Steganography with pixel-value differencing and modulus function based on PSO. J Inf Secur Appl 43:47–52. https://doi.org/10.1016/j.jisa.2018.10.006

Lorem Ipsum - All the facts - Lipsum generator. https://www.lipsum.com/. Accessed 16 Feb 2021

Luo W, Huang F, Huang J (2011) A more secure steganography based on adaptive pixel-value differencing scheme. Multimed Tools Appl 52:407–430. https://doi.org/10.1007/s11042-009-0440-3

Mader KS (2017) CT Medical Images | Kaggle. https://www.kaggle.com/datasets/kmader/siim-medical-images?select=tiff_images. Accessed 6 Apr 2022

Malik A, Singh S, Kumar R (2018) Recovery based high capacity reversible data hiding scheme using even-odd embedding. Multimed Tools Appl 77:15803–15827. https://doi.org/10.1007/s11042-017-5156-1

Mishra A, Kumar K, Kumar P, Mittal P (2020) A novel approach for handwritten character recognition using K-NN classifier. Advances in intelligent systems and computing. Springer, Berlin, pp 887–894

Mooney P (2018) Chest X-Ray Images (Pneumonia) | Kaggle. https://www.kaggle.com/datasets/paultimothymooney/chest-xray-pneumonia/metadata. Accessed 6 Apr 2022

Mukhopadhyay S, Hossain S, Ghosal SK, Sarkar R (2021) Secured image steganography based on Catalan transform. Multimed Tools Appl 1–26. https://doi.org/10.1007/s11042-020-10424-4

Negi A, Chauhan P, Kumar K, Rajput RS (2020) Face mask detection classifier and model pruning with Keras-Surgeon. In: 2020 5th IEEE International Conference on Recent Advances and Innovations in Engineering, ICRAIE 2020 - Proceeding. Institute of Electrical and Electronics Engineers Inc

Rehman TU, Mahmud MS, Chang YK et al (2019) Current and future applications of statistical machine learning algorithms for agricultural machine vision systems. Comput Electron Agric 156:585–605

Rustad S, Setiadi DRIM, Syukur A, Andono PN (2022) Inverted LSB image steganography using adaptive pattern to improve imperceptibility. J King Saud Univ - Comput Inf Sci 34:3559-3568. https://doi.org/10.1016/j.jksuci.2020.12.017

Saha S, Chakraborty A, Chatterjee A et al (2020) Extended exploiting modification direction based steganography using hashed-weightage Array. Multimed Tools Appl 79:20973–20993. https://doi.org/10.1007/s11042-020-08951-1

Sahu AK, Swain G (2019) An optimal information hiding approach based on pixel value differencing and modulus function. Wirel Pers Commun 108:159–174. https://doi.org/10.1007/s11277-019-06393-z

Setiadi DRIM (2019) Payload enhancement on least significant bit image steganography using edge area dilation. Intl J Electron Telecommun 65:295–300. https://doi.org/10.24425/ijet.2019.126313

Setiadi DRIM (2021) PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimed Tools Appl 80:8423–8444. https://doi.org/10.1007/s11042-020-10035-z

Setiadi DRIM (2022) Improved payload capacity in LSB image steganography uses dilated hybrid edge detection. J King Saud Univ - Comput Inf Sci 34:104–114. https://doi.org/10.1016/J.JKSUCI.2019.12.007

Shen S, Huang L, Tian Q (2015) A novel data hiding for color images based on pixel value difference and modulus function. Multimed Tools Appl 74:707–728. https://doi.org/10.1007/s11042-014-2016-0

Shukla AK, Singh A, Singh B, Kumar A (2018) A secure and high-capacity data-hiding method using compression, encryption and optimized pixel value differencing. IEEE Access 6:51130–51139. https://doi.org/10.1109/ACCESS.2018.2868192

Swain G (2016) Adaptive pixel value differencing steganography using both vertical and horizontal edges. Multimed Tools Appl 75:13541–13556. https://doi.org/10.1007/s11042-015-2937-2

Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: From error visibility to structural similarity. IEEE Trans Image Process 13:600–612. https://doi.org/10.1109/TIP.2003.819861

Wang C-M, Wu N-I, Tsai C-S, Hwang M-S(2008) A high quality steganographic method with pixel-value differencing and modulus function. J Syst Softw 81:150–158. https://doi.org/10.1016/J.JSS.2007.01.049

Wu D-C, Tsai W-H(2003) A steganographic method for images by pixel-value differencing. Pattern Recognit Lett 24:1613–1626. https://doi.org/10.1016/S0167-8655(02)00402-6

Younus ZS, Hussain MK (2019) Image steganography using exploiting modification direction for compressed encrypted data. J King Saud Univ - Comput Inf Sci. https://doi.org/10.1016/j.jksuci.2019.04.008

Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10:781–783. https://doi.org/10.1109/LCOMM.2006.060863