The combination of pixel value differencing (PVD) and least significant bit (LSB) substitution gives higher capacity and lesser distortion. However, there are three issues to be taken into account: (i) fall off boundary problem (FOBP), (ii) pixel difference histogram (PDH) analysis, and (iii) RS analysis. This paper proposes a steganography technique in two variants using combination of modified LSB substitution and PVD by taking care of these three issues. The first variant operates on 2 × 3 pixel blocks and the second technique operates on 3 × 3 pixel blocks. In one of the pixels of a block, embedding is performed using modified LSB substitution. Based on the new value of this pixel, difference values with other neighboring pixels are cal...
Abstract. Many existing steganographic methods hide more secret data into edged areas than smooth ar...
In this paper, a modification of PVD (Pixel Value Differencing) algorithm is used for Image Steganog...
We herein advance a secure steganographic algorithm that uses a turnover policy and a novel adjustin...
To protect from pixel difference histogram (PDH) analysis and RS analysis, two hybrid image steganog...
AbstractIn the recent past some steganography techniques by combining least significant bit (LSB) su...
The least significant bit (LSB) substitution techniques are detected by RS analysis and the traditio...
Over the past few years, in order to improve the hiding capacity and the peak signal-to-noise ratio ...
There has been a tremendous growth in Information and Communication technologies during the last dec...
In this paper, a steganography technique using LSB substitution and PVD method is presented as an ad...
Abstract Pixel value differencing (PVD) steganography techniques produce imperceptible stego‐images....
Steganography is the art and practice of communication using hidden messages. The least significant ...
[[abstract]]This paper proposes a new adaptive least-significant- bit (LSB) steganographic method us...
With the intrusion of internet into the lives of every household and terabytes of data being transmi...
Steganography is the science of secret data communication using carrier medium, such as images, vide...
The fundamental objectives of image steganographic algorithm are to simultaneously achieve high payl...
Abstract. Many existing steganographic methods hide more secret data into edged areas than smooth ar...
In this paper, a modification of PVD (Pixel Value Differencing) algorithm is used for Image Steganog...
We herein advance a secure steganographic algorithm that uses a turnover policy and a novel adjustin...
To protect from pixel difference histogram (PDH) analysis and RS analysis, two hybrid image steganog...
AbstractIn the recent past some steganography techniques by combining least significant bit (LSB) su...
The least significant bit (LSB) substitution techniques are detected by RS analysis and the traditio...
Over the past few years, in order to improve the hiding capacity and the peak signal-to-noise ratio ...
There has been a tremendous growth in Information and Communication technologies during the last dec...
In this paper, a steganography technique using LSB substitution and PVD method is presented as an ad...
Abstract Pixel value differencing (PVD) steganography techniques produce imperceptible stego‐images....
Steganography is the art and practice of communication using hidden messages. The least significant ...
[[abstract]]This paper proposes a new adaptive least-significant- bit (LSB) steganographic method us...
With the intrusion of internet into the lives of every household and terabytes of data being transmi...
Steganography is the science of secret data communication using carrier medium, such as images, vide...
The fundamental objectives of image steganographic algorithm are to simultaneously achieve high payl...
Abstract. Many existing steganographic methods hide more secret data into edged areas than smooth ar...
In this paper, a modification of PVD (Pixel Value Differencing) algorithm is used for Image Steganog...
We herein advance a secure steganographic algorithm that uses a turnover policy and a novel adjustin...