We herein advance a secure steganographic algorithm that uses a turnover policy and a novel adjusting process. Although the method of Wang et al. uses Pixel-Value Differencing (PVD) and their modulus function provides high capacity and good image quality, the embedding process causes a number of artifacts, such as abnormal increases and fluctuations in the PVD histogram, which may reveal the existence of the hidden message. In order to enhance the security of the algorithm, a turnover policy is used that prevents abnormal increases in the histogram values and a novel adjusting process is devised to remove the fluctuations at the border of the subrange in the PVD histogram. The proposed method therefore eliminates all the weaknesses of the P...
The least significant bit (LSB) substitution techniques are detected by RS analysis and the traditio...
In this paper, we present a novel steganographic method for embedding of secret data in still graysc...
The combination of Steganography and cryptography algorithms can improve the security of data you wa...
In this paper, we shall propose a new image steganographic technique capable of producing a secret-e...
[[abstract]]In this paper, we shall propose a new image steganographic technique capable of producin...
The combination of pixel value differencing (PVD) and least significant bit (LSB) substitution gives...
Pixel-value-differencing (PVD) based steganographic methods, which take into account the characteris...
Abstract Pixel value differencing (PVD) steganography techniques produce imperceptible stego‐images....
Steganography is the science of secret data communication using carrier medium, such as images, vide...
In this paper, a modification of PVD (Pixel Value Differencing) algorithm is used for Image Steganog...
In this paper, a steganography technique using LSB substitution and PVD method is presented as an ad...
AbstractSteganography is the only answer for secure and secret communication. Existing methods in im...
The fundamental objectives of image steganographic algorithm are to simultaneously achieve high payl...
To protect from pixel difference histogram (PDH) analysis and RS analysis, two hybrid image steganog...
[[abstract]]A new and efficient steganographic method for embedding secret messages into a gray-valu...
The least significant bit (LSB) substitution techniques are detected by RS analysis and the traditio...
In this paper, we present a novel steganographic method for embedding of secret data in still graysc...
The combination of Steganography and cryptography algorithms can improve the security of data you wa...
In this paper, we shall propose a new image steganographic technique capable of producing a secret-e...
[[abstract]]In this paper, we shall propose a new image steganographic technique capable of producin...
The combination of pixel value differencing (PVD) and least significant bit (LSB) substitution gives...
Pixel-value-differencing (PVD) based steganographic methods, which take into account the characteris...
Abstract Pixel value differencing (PVD) steganography techniques produce imperceptible stego‐images....
Steganography is the science of secret data communication using carrier medium, such as images, vide...
In this paper, a modification of PVD (Pixel Value Differencing) algorithm is used for Image Steganog...
In this paper, a steganography technique using LSB substitution and PVD method is presented as an ad...
AbstractSteganography is the only answer for secure and secret communication. Existing methods in im...
The fundamental objectives of image steganographic algorithm are to simultaneously achieve high payl...
To protect from pixel difference histogram (PDH) analysis and RS analysis, two hybrid image steganog...
[[abstract]]A new and efficient steganographic method for embedding secret messages into a gray-valu...
The least significant bit (LSB) substitution techniques are detected by RS analysis and the traditio...
In this paper, we present a novel steganographic method for embedding of secret data in still graysc...
The combination of Steganography and cryptography algorithms can improve the security of data you wa...