journal article Jul 01, 2018

Chaotic system-based secure data hiding scheme with high embedding capacity

View at Publisher Save 10.1016/j.compeleceng.2018.02.022
Topics

No keywords indexed for this article. Browse by subject →

References
19
[1]
Wang "A novel colour image encryption algorithm based on chaos." Signal Process (2012) 10.1016/j.sigpro.2011.10.023
[2]
Kanan "A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm" Expert Syst Appl (2014) 10.1016/j.eswa.2014.04.022
[3]
Wu "A magic cube based information hiding scheme of large payload" J Inf Secur Appl (2016)
[4]
Parah "Data hiding in scrambled images: a new double layer security data hiding technique" Comput Electr Eng (2014) 10.1016/j.compeleceng.2013.11.006
[5]
Yadav "Secure data hiding scheme using shape generation algorithm: a key based approach" Multimed Tools Appl (2017)
[6]
Martnez-Gonzlez "A steganographic method using bernoullis chaotic maps" Comput Electr Eng (2016) 10.1016/j.compeleceng.2015.12.005
[7]
Zhang "Efficient steganographic embedding by exploiting modification direction" IEEE Commun Lett (2006) 10.1109/lcomm.2006.060863
[8]
Kuo "Data hiding based on generalised exploiting modification direction method" Imag Sci J (2013) 10.1179/1743131x12y.0000000011
[9]
Kuo "High capacity data hiding scheme based on multi-bit encoding function" Optik-Int J Light Electron Opt (2016) 10.1016/j.ijleo.2015.08.056
[10]
Eslami "Secret image sharing with authentication-chaining and dynamic embedding" J Syst Softw (2011) 10.1016/j.jss.2011.01.002
[11]
Martnez "A steganographic method using bernoullis chaotic maps" Comput Electr Eng (2016) 10.1016/j.compeleceng.2015.12.005
[12]
Bandyopadhyay "A novel secure image steganography method based on chaos theory in spatial domain" Int J Secur Privacy Trust Manage (2014) 10.5121/ijsptm.2014.3102
[13]
Anees "A technique for digital steganography using chaotic maps" Nonlinear Dyn (2014) 10.1007/s11071-013-1105-3
[14]
Yang "Steganography and authentication in image sharing without parity bits" Opt Commun (2012) 10.1016/j.optcom.2011.12.003
[15]
Chan "Hiding data in images by simple LSB substitution" Pattern Recognit (2004) 10.1016/j.patcog.2003.08.007
[16]
Fridrich "Detecting LSB steganography in color, and gray-scale images" IEEE Multimedia (2001) 10.1109/93.959097
[17]
Cheddad "Digital image steganography: survey and analysis of current methods" Signal Process (2010) 10.1016/j.sigpro.2009.08.010
[18]
Lin "Novel secure data hiding scheme using a secret reference matrix" (2009)
[19]
Chang "An information hiding scheme using sudoku" (2008)
Cited By
9
Multimedia Tools and Applications
Metrics
9
Citations
19
References
Details
Published
Jul 01, 2018
Vol/Issue
69
Pages
447-460
License
View
Cite This Article
Gyan Singh Yadav, Aparajita Ojha (2018). Chaotic system-based secure data hiding scheme with high embedding capacity. Computers & Electrical Engineering, 69, 447-460. https://doi.org/10.1016/j.compeleceng.2018.02.022
Related

You May Also Like

A survey on feature selection methods

Girish Chandrashekar, Ferat Sahin · 2014

4,270 citations

A deep learning approach for brain tumor classification using MRI images

Muhammad Aamir, Ziaur Rahman · 2022

265 citations