Academic literature on the topic 'Pixel value differencing scheme'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Pixel value differencing scheme.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Pixel value differencing scheme"

1

Kim, Pyung-Han, Eun-Jun Yoon, Kwan-Woo Ryu, and Ki-Hyun Jung. "Data-Hiding Scheme Using Multidirectional Pixel-Value Differencing on Colour Images." Security and Communication Networks 2019 (October 31, 2019): 1–11. http://dx.doi.org/10.1155/2019/9038650.

Full text
Abstract:
Data hiding is a technique that hides the existence of secret data from malicious attackers. In this paper, we propose a new data-hiding scheme using multidirectional pixel-value differencing, which can embed secret data in two directions or three directions on colour images. The cover colour image is divided into nonoverlapping blocks, and the pixels of each block are decomposed into R, G, and B channels. The pixels of each block perform regrouping, and then the minimum pixel value within each block is selected. The secret data can be embedded into two directions or three directions based on
APA, Harvard, Vancouver, ISO, and other styles
2

Kim, Pyung-Han, Kwan-Woo Ryu, and Ki-Hyun Jung. "Reversible data hiding scheme based on pixel-value differencing in dual images." International Journal of Distributed Sensor Networks 16, no. 7 (2020): 155014772091100. http://dx.doi.org/10.1177/1550147720911006.

Full text
Abstract:
In this article, a new reversible data hiding scheme using pixel-value differencing in dual images is proposed. The proposed pixel-value differencing method can embed more secret data as the difference value of adjacent pixels is increased. In the proposed scheme, the cover image is divided into non-overlapping blocks and the maximum difference value is calculated to hide secret bits. On the sender side, the length of embeddable secret data is calculated by using the maximum difference value and the log function, and the decimal secret data are embedded into the two stego-images after applying
APA, Harvard, Vancouver, ISO, and other styles
3

Malik, Aruna, and Sonal Gandhi. "Efficient Pixel-Value Differencing Based Hybrid Steganographic Method Using Modulus Function." International Journal of Information Retrieval Research 10, no. 4 (2020): 51–62. http://dx.doi.org/10.4018/ijirr.2020100104.

Full text
Abstract:
In the era of cloud computing and Big Data, steganographic methods are playing a pivotal role to provide security to sensitive contents. In the steganographic domain, pixel-value differencing (PVD) proposed by Wu and Tsai has been one of the most researched and popular methods as the PVD technique provides good quality stego-image along with high embedding capacity. This article extends the Wu and Tsai's work by proposing a new hybrid steganography scheme which works in two phases to increase the embedding capacity along with stego-image quality. In the first phase, the cover image is preproce
APA, Harvard, Vancouver, ISO, and other styles
4

Chang, Chin-Chen, Jun-Chou Chuang, and Yu-Chen Hu. "Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing." Fundamenta Informaticae 70, no. 3 (2006): 171–84. https://doi.org/10.3233/fun-2006-70301.

Full text
Abstract:
In this paper, we present a spatial domain Image hiding scheme that embeds secret data in a gray-level image. Our scheme is inspired from Wu and Tsai's scheme that embeds secret bits in the difference values of consecutive pixels. To improve the hiding capacity of their scheme, the overlapping concept is proposed to produce more difference values from the cover image in this paper. Experimental results show that our scheme provides an average hiding capacity gain of 84.16% over Wu and Tsai's scheme while maintaining satisfactory image quality.
APA, Harvard, Vancouver, ISO, and other styles
5

Prasad, Shiv, and Arup Kumar Pal. "An RGB colour image steganography scheme using overlapping block-based pixel-value differencing." Royal Society Open Science 4, no. 4 (2017): 161066. http://dx.doi.org/10.1098/rsos.161066.

Full text
Abstract:
This paper presents a steganographic scheme based on the RGB colour cover image. The secret message bits are embedded into each colour pixel sequentially by the pixel-value differencing (PVD) technique. PVD basically works on two consecutive non-overlapping components; as a result, the straightforward conventional PVD technique is not applicable to embed the secret message bits into a colour pixel, since a colour pixel consists of three colour components, i.e. red, green and blue. Hence, in the proposed scheme, initially the three colour components are represented into two overlapping blocks l
APA, Harvard, Vancouver, ISO, and other styles
6

Luo, Weiqi, Fangjun Huang, and Jiwu Huang. "A more secure steganography based on adaptive pixel-value differencing scheme." Multimedia Tools and Applications 52, no. 2-3 (2010): 407–30. http://dx.doi.org/10.1007/s11042-009-0440-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Arunkumar, K. G., and A. Jasmine Antony Raj Mr. "DATA HIDING SCHEME BASED ON PIXEL VALUE DIFFERENCING IN DUAL IMAGES." Volume 8 Issue 11 8, no. 11 (2021): 8–9. https://doi.org/10.5281/zenodo.5675259.

Full text
Abstract:
Data hiding is to conceal the mysterious message in to cover objects without distortion. In the proposed method, another data hiding technique is proposed to provide high embedding limit in dual images. The proposed strategy produces twost ego images after embedding the mysterious pieces into a cover picture. A sub square of two consecutive pixels is utilized to have different length of embedding pieces by applying the difference value of two pixels. The experimental results show that the proposed technique can have a high embedding limit maintaining less distortion.
APA, Harvard, Vancouver, ISO, and other styles
8

DHARWADKAR, NAGARAJ V., and B. B. AMBERKER. "STEGANOGRAPHIC SCHEME FOR GRAY-LEVEL IMAGE USING PIXEL NEIGHBORHOOD AND LSB SUBSTITUTION." International Journal of Image and Graphics 10, no. 04 (2010): 589–607. http://dx.doi.org/10.1142/s0219467810003901.

Full text
Abstract:
The exchange of secret message using images has vital importance in secret communication. Steganographic scheme is employed to achieve the task of secret message communication using images. The existing scheme based on pixel value differencing (PVD) with least significant bit (LSB) sequential substitution suffer from low embedding capacity. The embedding capacity is increased by using the edge regions of image obtained by neighborhood connectivity of pixel. We propose an adaptive steganographic scheme for gray-level images. Our scheme relies on the neighborhood connectivity of pixels to estima
APA, Harvard, Vancouver, ISO, and other styles
9

Tseng, Hsien-Wen, and Hui-Shih Leng. "A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number." Journal of Applied Mathematics 2013 (2013): 1–8. http://dx.doi.org/10.1155/2013/189706.

Full text
Abstract:
The pixel-value differencing (PVD) scheme uses the difference value between two consecutive pixels in a block to determine how many secret bits should be embedded. There are two types of the quantization range table in Wu and Tasi's method. The first was based on selecting the range widths of [8, 8, 16, 32, 64, 128], to provide large capacity. The second was based on selecting the range widths of [2, 2, 4, 4, 4, 8, 8, 16, 16, 32, 32, 64, 64], to provide high imperceptibility. Most of the related studies focus on increasing the capacity using LSB and the readjustment process, so their approach
APA, Harvard, Vancouver, ISO, and other styles
10

Huang, Cheng-Ta, Njabulo Sinethemba Shongwe, and Chi-Yao Weng. "Enhanced Embedding Capacity for Data Hiding Approach Based on Pixel Value Differencing and Pixel Shifting Technology." Electronics 12, no. 5 (2023): 1200. http://dx.doi.org/10.3390/electronics12051200.

Full text
Abstract:
Data hiding algorithms can achieve the issue of information security when secret data are transmitted via the public network. This paper proposes a novel data-hiding scheme based on pixel value differencing and pixel shifting to increase embedding capacity and visual quality. In the proposed method, the cover image is first divided into nonoverlapping blocks, and eight groups of different values are generated with the center pixel as the reference pixel to embed the secret message. The pixel shifting strategy is applied to adjust the stego image to improve its quality. Experimental results sho
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Pixel value differencing scheme"

1

LEE, CHIA-MING, and 李家明. "A Digital Data Hiding Scheme Based on Pixel-Value Differencing." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/x9an96.

Full text
Abstract:
碩士<br>國防大學<br>資訊管理學系<br>105<br>After the invention of the computer and the network information age,the transmission of information is becoming more and more convenient and quick.Up to the national documents, military secrets, down to the business transactions or each department's plan, all of these secure communication mechanism to obtain the safeguard.Information hiding becomes a solution and a hot research topic. Pixel value difference-Based Steganography can make a large of secret messages hidden in the images effectively. There are three methods in this paper, the integration of pixel valu
APA, Harvard, Vancouver, ISO, and other styles
2

Chang, Shih-Han, and 張仕翰. "A New Pixel-Value Differencing Steganography Scheme Based on Space Filling Curve." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/v9mkhd.

Full text
Abstract:
碩士<br>國立東華大學<br>資訊工程學系<br>96<br>Steganography and digital watermarking are two well-known subjects in information hiding techniques. Digital watermarking is dedicated on robustness and fragility, and is usually used for copyright protection and authentication. However, steganography is aimed at the high embedding capacity and the imperceptibility. Recently, steganography is widely used in error-resilient image coding schemes which embed the important data of image into the same image such that the image quality is not degraded much; also the important data can be extracted for error resiliency
APA, Harvard, Vancouver, ISO, and other styles
3

LIU, HSIN-FU, and 劉信甫. "Hybrid Data Hiding Scheme Based on Least Significant Bit and Pixel Value Differencing." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/51859300171600569824.

Full text
Abstract:
碩士<br>朝陽科技大學<br>資訊管理系<br>104<br>This paper presents a data-hiding method based on least-significant-bit (LSB) substitution and an improved Pixel-Value Differencing (PVD) method for grayscale images. The proposed method partitions the cover image into 5×5 non-overlapping blocks. For each block, selects the central pixel as the base pixel and the other pixels in this block are classified into inner-layer and outer-layer. Then, the secret message is embedded into the inner-layer and outer-layer that which method makes this block has minimum Mean Squared Error. The experimental results show that t
APA, Harvard, Vancouver, ISO, and other styles
4

Lien, Ching-Ke, and 連青科. "Study of Payload Estimation for Steganalysis of Pixel-value Differencing Steganography." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/42428885157359925442.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

JI, YI-CHENG, and 紀奕丞. "A Secured Pixel-value Differencing Data Hiding Based on Rearrangement Pixels." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/v8um6e.

Full text
Abstract:
碩士<br>國防大學<br>資訊管理學系<br>106<br>We present an information hiding method that involves re-arranged image pixel values and then embedded secrets. The purpose of this scheme is to improve the hidden capacity of secrets and the security of secrets. The general information hiding technology is mainly to discuss the payload of hidden secrets and the image quality of stego-image. However, if someone captures the stego-image and find out the information hiding method, the secret messages can be immediately taken out. This method use rearranged the pixels in the image before embedding secrets and then t
APA, Harvard, Vancouver, ISO, and other styles
6

YAO, TZU HAO, and 姚子豪. "Research on GPS Positioning Information Applied to Pixel-Value Differencing Data Hiding." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/axn5e4.

Full text
Abstract:
碩士<br>國防大學<br>資訊管理學系<br>107<br>In the military, the transmission of intelligence and information is very important. The tasks, the movements of the troops, and the tactical tactics are all about the whole body. The so-called "one word leaks, the whole army is destroyed" is how it is simple. How to convey the sentiment in a simple and fast way without being discovered by others is one of the important topics of all wars since ancient times. As the computer evolved with the times, the early giants have evolved into small and exquisite nano computers, which are smaller, faster, more computational
APA, Harvard, Vancouver, ISO, and other styles
7

LIU, KUNG-CHIN, and 劉功勤. "Study of the Pixel-Value Differencing Steganalysis Based on Chi-Square Attack." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/ra4sg7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wei, Wei-Ching, and 魏瑋慶. "A New Quality Enhanced Steganographic Method by Pixel-value Differencing and Modulus Function." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/30329420272612323350.

Full text
Abstract:
碩士<br>逢甲大學<br>通訊工程所<br>97<br>Image steganography is a secret communication technique that is different from encryption/decryption methods from cryptology, where image steganography utilizes non-confidential and meaningful digital images to cover and transmit secret messages that can be expressed with bit streams. With such a technique, attackers or any third party aside from the sender and the recipient are unable to discover the existence of the hidden message through the human eye or statistical detection. In 2003, Wu and Tsai proposed a simple and effective image steganography technique, ca
APA, Harvard, Vancouver, ISO, and other styles
9

Luo, Chih-Wei, and 劉志威. "Data Embedding Using Pixel Value Differencing And Diamond Encoding With Multiple-Base Notational System." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/90875046569285788496.

Full text
Abstract:
碩士<br>育達商業科技大學<br>資訊管理所<br>100<br>We propose a new data hiding method that adaptively embeds data into pixel pairs using the diamond encoding (DE) technique. Because the human eyes tolerate more changes in edge and texture areas than in smooth areas, and pixel pairs in these areas often possess larger differences, the method exploits pixel value differences (PVD) to estimate the base of digits to be embedded into pixel pairs. Pixel pairs with larger differences are embedded with digits in larger base than those pixel pairs with smaller differences to maximize the payload and image quality. Two
APA, Harvard, Vancouver, ISO, and other styles
10

Chiu, Min-Yen, and 邱閔彥. "The Analysis of the Steganographic Technique with High Image Quality Using Secret Data Division and Pixel Value Differencing." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/64762254230164040576.

Full text
Abstract:
碩士<br>朝陽科技大學<br>資訊與通訊系碩士班<br>98<br>We propose a steganographic method which is using secret data division and pixel value differencing in this study. It can increase the image quality of the stego-image. In the filed of steganography, hiding a lot of secret data into the cover-image will cause serious distortion. In other words, the hiding capacity is limited by maintaining the image quality. In this study, we proposed a method using separating techniques and pixel value differencing to solve this problem. By our proposed method, we obtain better effect on the image quality without making an
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Pixel value differencing scheme"

1

Zhang, Hong, Qingxiao Guan, and Xianfeng Zhao. "Steganography Based on Adaptive Pixel-Value Differencing Scheme Revisited." In Digital-Forensics and Watermarking. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43886-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jana Biswapati, Giri Debasis, and Mondal Shyamal Kumar. "Dual-Image Based Reversible Data Hiding Scheme Through Pixel Value Differencing with Exploiting Modification Direction." In Advances in Intelligent Systems and Computing. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-2035-3_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Himakshi, Harsh Kumar Verma, Ravindra Kumar Singh, and Charan Kamaljit Singh. "Bi-directional Pixel-Value Differencing Approach for Steganography." In Advances in Intelligent Systems and Computing. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1771-8_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Das, Debashis, and Ratan Kumar Basak. "Rank Based Pixel-Value-Differencing: A Secure Steganographic Approach." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2188-1_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Weng, Chi-Yao, Yen-Chia Huang, Chin-Feng Lee, and Dong-Peng Lin. "Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing." In Advances in Intelligent Systems and Computing. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6487-6_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Agrawal, Shrikant S., and Rahul M. Samant. "Data Hiding in Gray-Scale Images Using Pixel Value Differencing." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20209-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kekre, H. B., Pallavi Halarnkar, and Karan Dhamejani. "Capacity Increase for Information Hiding Using Maximum Edged Pixel Value Differencing." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20209-4_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Leng, Hui-Shih. "A New Data Hiding Strategy Based on Pixel-Value-Differencing Method." In Advances in Intelligent Information Hiding and Multimedia Signal Processing. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-63856-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Krishna, Vaidya, Kargathara Afsana, and C. K. Kumbharana. "Pixel Value Differencing of Image Steganography in Substitution Technique: A Survey." In Data Driven Approach Towards Disruptive Technologies. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9873-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chowdhuri, Partha, Pabitra Pal, Biswapati Jana, and Debasis Giri. "A New Repeated Pixel Value Difference-Based Steganographic Scheme with Overlapped Pixel." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4288-6_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Pixel value differencing scheme"

1

Ko-Chin Chang, Ping S. Huang, Te-Ming Tu, and Chien-Ping Chang. "Adaptive image steganographic scheme based on Tri-way Pixel-Value Differencing." In 2007 IEEE International Conference on Systems, Man and Cybernetics. IEEE, 2007. http://dx.doi.org/10.1109/icsmc.2007.4413888.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jung, Ki-Hyun. "Data hiding scheme based on pixel-value differencing in dual images." In 2018 International Conference on Electronics, Information, and Communication (ICEIC). IEEE, 2018. http://dx.doi.org/10.23919/elinfocom.2018.8330722.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chang, Ko-Chin, Ping S. Huang, T.-M. Tu, and Chien-Ping Chang. "Image Steganographic Scheme Using Tri-way Pixel-Value Differencing and Adaptive Rules." In Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, 2007. http://dx.doi.org/10.1109/iihmsp.2007.4457745.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mandal, J. K., and A. Khamrui. "A Data-Hiding Scheme for Digital Image Using Pixel Value Differencing (DHPVD)." In 2011 International Symposium on Electronic System Design (ISED). IEEE, 2011. http://dx.doi.org/10.1109/ised.2011.37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Yu, Bailong Yang, Wenqiang Zhao, and Zhihua Yuan. "Encrypted Image Steganographic Scheme based on Pixel Valued Differencing." In 2017 International Conference on Mechanical, Electronic, Control and Automation Engineering (MECAE 2017). Atlantis Press, 2017. http://dx.doi.org/10.2991/mecae-17.2017.26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Cheng-Hsing, Shiuh-Jeng Wang, and Chi-Yao Weng. "Analyses of Pixel-Value-Differencing Schemes with LSB Replacement in Stegonagraphy." In Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, 2007. http://dx.doi.org/10.1109/iihmsp.2007.4457584.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Idbeaa, Tarik Faraj, Salina Abdul Samad, and Hafizah Husain. "An adaptive compressed video steganography based on pixel-value differencing schemes." In 2015 International Conference on Advanced Technologies for Communications (ATC). IEEE, 2015. http://dx.doi.org/10.1109/atc.2015.7388379.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kuo, Wen-Chung, Jyun-Jia Li, Chun-Cheng Wang, Lih-Chyau Wuu, and Yu-Chih Huang. "An Improvement Data Hiding Scheme Based on Formula Fully Exploiting Modification Directions and Pixel Value Differencing Method." In 2016 11th Asia Joint Conference on Information Security (AsiaJCIS). IEEE, 2016. http://dx.doi.org/10.1109/asiajcis.2016.20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Hanling, Guangzhi Geng, and Caiqiong Xiong. "Image Steganography Using Pixel-Value Differencing." In Second International Symposium on Electronic Commerce and Security, ISECS 2009. IEEE, 2009. http://dx.doi.org/10.1109/isecs.2009.139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sabeti, Vajiheh, Shadrokh Samavi, Mojtaba Mahdavi, and Shahram Shirani. "Steganalysis of Pixel-Value Differencing Steganographic Method." In 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing. IEEE, 2007. http://dx.doi.org/10.1109/pacrim.2007.4313232.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!