To see the other types of publications on this topic, follow the link: Pixel value differencing scheme.

Journal articles on the topic 'Pixel value differencing scheme'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Pixel value differencing scheme.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kim, Pyung-Han, Eun-Jun Yoon, Kwan-Woo Ryu, and Ki-Hyun Jung. "Data-Hiding Scheme Using Multidirectional Pixel-Value Differencing on Colour Images." Security and Communication Networks 2019 (October 31, 2019): 1–11. http://dx.doi.org/10.1155/2019/9038650.

Full text
Abstract:
Data hiding is a technique that hides the existence of secret data from malicious attackers. In this paper, we propose a new data-hiding scheme using multidirectional pixel-value differencing, which can embed secret data in two directions or three directions on colour images. The cover colour image is divided into nonoverlapping blocks, and the pixels of each block are decomposed into R, G, and B channels. The pixels of each block perform regrouping, and then the minimum pixel value within each block is selected. The secret data can be embedded into two directions or three directions based on
APA, Harvard, Vancouver, ISO, and other styles
2

Kim, Pyung-Han, Kwan-Woo Ryu, and Ki-Hyun Jung. "Reversible data hiding scheme based on pixel-value differencing in dual images." International Journal of Distributed Sensor Networks 16, no. 7 (2020): 155014772091100. http://dx.doi.org/10.1177/1550147720911006.

Full text
Abstract:
In this article, a new reversible data hiding scheme using pixel-value differencing in dual images is proposed. The proposed pixel-value differencing method can embed more secret data as the difference value of adjacent pixels is increased. In the proposed scheme, the cover image is divided into non-overlapping blocks and the maximum difference value is calculated to hide secret bits. On the sender side, the length of embeddable secret data is calculated by using the maximum difference value and the log function, and the decimal secret data are embedded into the two stego-images after applying
APA, Harvard, Vancouver, ISO, and other styles
3

Malik, Aruna, and Sonal Gandhi. "Efficient Pixel-Value Differencing Based Hybrid Steganographic Method Using Modulus Function." International Journal of Information Retrieval Research 10, no. 4 (2020): 51–62. http://dx.doi.org/10.4018/ijirr.2020100104.

Full text
Abstract:
In the era of cloud computing and Big Data, steganographic methods are playing a pivotal role to provide security to sensitive contents. In the steganographic domain, pixel-value differencing (PVD) proposed by Wu and Tsai has been one of the most researched and popular methods as the PVD technique provides good quality stego-image along with high embedding capacity. This article extends the Wu and Tsai's work by proposing a new hybrid steganography scheme which works in two phases to increase the embedding capacity along with stego-image quality. In the first phase, the cover image is preproce
APA, Harvard, Vancouver, ISO, and other styles
4

Chang, Chin-Chen, Jun-Chou Chuang, and Yu-Chen Hu. "Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing." Fundamenta Informaticae 70, no. 3 (2006): 171–84. https://doi.org/10.3233/fun-2006-70301.

Full text
Abstract:
In this paper, we present a spatial domain Image hiding scheme that embeds secret data in a gray-level image. Our scheme is inspired from Wu and Tsai's scheme that embeds secret bits in the difference values of consecutive pixels. To improve the hiding capacity of their scheme, the overlapping concept is proposed to produce more difference values from the cover image in this paper. Experimental results show that our scheme provides an average hiding capacity gain of 84.16% over Wu and Tsai's scheme while maintaining satisfactory image quality.
APA, Harvard, Vancouver, ISO, and other styles
5

Prasad, Shiv, and Arup Kumar Pal. "An RGB colour image steganography scheme using overlapping block-based pixel-value differencing." Royal Society Open Science 4, no. 4 (2017): 161066. http://dx.doi.org/10.1098/rsos.161066.

Full text
Abstract:
This paper presents a steganographic scheme based on the RGB colour cover image. The secret message bits are embedded into each colour pixel sequentially by the pixel-value differencing (PVD) technique. PVD basically works on two consecutive non-overlapping components; as a result, the straightforward conventional PVD technique is not applicable to embed the secret message bits into a colour pixel, since a colour pixel consists of three colour components, i.e. red, green and blue. Hence, in the proposed scheme, initially the three colour components are represented into two overlapping blocks l
APA, Harvard, Vancouver, ISO, and other styles
6

Luo, Weiqi, Fangjun Huang, and Jiwu Huang. "A more secure steganography based on adaptive pixel-value differencing scheme." Multimedia Tools and Applications 52, no. 2-3 (2010): 407–30. http://dx.doi.org/10.1007/s11042-009-0440-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Arunkumar, K. G., and A. Jasmine Antony Raj Mr. "DATA HIDING SCHEME BASED ON PIXEL VALUE DIFFERENCING IN DUAL IMAGES." Volume 8 Issue 11 8, no. 11 (2021): 8–9. https://doi.org/10.5281/zenodo.5675259.

Full text
Abstract:
Data hiding is to conceal the mysterious message in to cover objects without distortion. In the proposed method, another data hiding technique is proposed to provide high embedding limit in dual images. The proposed strategy produces twost ego images after embedding the mysterious pieces into a cover picture. A sub square of two consecutive pixels is utilized to have different length of embedding pieces by applying the difference value of two pixels. The experimental results show that the proposed technique can have a high embedding limit maintaining less distortion.
APA, Harvard, Vancouver, ISO, and other styles
8

DHARWADKAR, NAGARAJ V., and B. B. AMBERKER. "STEGANOGRAPHIC SCHEME FOR GRAY-LEVEL IMAGE USING PIXEL NEIGHBORHOOD AND LSB SUBSTITUTION." International Journal of Image and Graphics 10, no. 04 (2010): 589–607. http://dx.doi.org/10.1142/s0219467810003901.

Full text
Abstract:
The exchange of secret message using images has vital importance in secret communication. Steganographic scheme is employed to achieve the task of secret message communication using images. The existing scheme based on pixel value differencing (PVD) with least significant bit (LSB) sequential substitution suffer from low embedding capacity. The embedding capacity is increased by using the edge regions of image obtained by neighborhood connectivity of pixel. We propose an adaptive steganographic scheme for gray-level images. Our scheme relies on the neighborhood connectivity of pixels to estima
APA, Harvard, Vancouver, ISO, and other styles
9

Tseng, Hsien-Wen, and Hui-Shih Leng. "A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number." Journal of Applied Mathematics 2013 (2013): 1–8. http://dx.doi.org/10.1155/2013/189706.

Full text
Abstract:
The pixel-value differencing (PVD) scheme uses the difference value between two consecutive pixels in a block to determine how many secret bits should be embedded. There are two types of the quantization range table in Wu and Tasi's method. The first was based on selecting the range widths of [8, 8, 16, 32, 64, 128], to provide large capacity. The second was based on selecting the range widths of [2, 2, 4, 4, 4, 8, 8, 16, 16, 32, 32, 64, 64], to provide high imperceptibility. Most of the related studies focus on increasing the capacity using LSB and the readjustment process, so their approach
APA, Harvard, Vancouver, ISO, and other styles
10

Huang, Cheng-Ta, Njabulo Sinethemba Shongwe, and Chi-Yao Weng. "Enhanced Embedding Capacity for Data Hiding Approach Based on Pixel Value Differencing and Pixel Shifting Technology." Electronics 12, no. 5 (2023): 1200. http://dx.doi.org/10.3390/electronics12051200.

Full text
Abstract:
Data hiding algorithms can achieve the issue of information security when secret data are transmitted via the public network. This paper proposes a novel data-hiding scheme based on pixel value differencing and pixel shifting to increase embedding capacity and visual quality. In the proposed method, the cover image is first divided into nonoverlapping blocks, and eight groups of different values are generated with the center pixel as the reference pixel to embed the secret message. The pixel shifting strategy is applied to adjust the stego image to improve its quality. Experimental results sho
APA, Harvard, Vancouver, ISO, and other styles
11

Wu, H. C., N. I. Wu, C. S. Tsai, and M. S. Hwang. "Image steganographic scheme based on pixel-value differencing and LSB replacement methods." IEE Proceedings - Vision, Image, and Signal Processing 152, no. 5 (2005): 611. http://dx.doi.org/10.1049/ip-vis:20059022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Shen, Shu-Yuan, and Li-Hong Huang. "A data hiding scheme using pixel value differencing and improving exploiting modification directions." Computers & Security 48 (February 2015): 131–41. http://dx.doi.org/10.1016/j.cose.2014.07.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Tarik Faraj Idbeaa, Salina Abdul Samad, and Hafizah Husain. "Embedding Data in MPEG-2 Compressed Video using an improved Pixel- Value-Differencing Scheme." International Journal of Advancements in Computing Technology 5, no. 11 (2013): 157–70. http://dx.doi.org/10.4156/ijact.vol5.issue11.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Malik, Aruna, Geeta Sikka, and Harsh Kumar Verma. "A Modified Pixel-Value Differencing Image Steganographic Scheme with Least Significant Bit Substitution Method." International Journal of Image, Graphics and Signal Processing 7, no. 4 (2015): 68–74. http://dx.doi.org/10.5815/ijigsp.2015.04.08.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Yang, Cheng-Hsing, Chi-Yao Weng, Hao-Kuan Tso, and Shiuh-Jeng Wang. "A data hiding scheme using the varieties of pixel-value differencing in multimedia images." Journal of Systems and Software 84, no. 4 (2011): 669–78. http://dx.doi.org/10.1016/j.jss.2010.11.889.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Liu, Hsing-Han, Yuh-Chi Lin, and Chia-Ming Lee. "A digital data hiding scheme based on pixel-value differencing and side match method." Multimedia Tools and Applications 78, no. 9 (2018): 12157–81. http://dx.doi.org/10.1007/s11042-018-6766-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Majumder, Jayeeta, and Chittaranjan Pradhan. "An interpolation based steganographic technique with least significant-bit and pixel value differencing in a pixel block." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 2 (2022): 1074–82. https://doi.org/10.11591/ijeecs.v27.i2.pp1074-1082.

Full text
Abstract:
Over the past few years, in order to improve the hiding capacity and the peak signal-to-noise ratio (PSNR) value, several steganographic techniques have been developed. Steganography has become a popular technique to transmit secret data through any medium. In image steganography, the human eye cannot easily identify the hidden data which is embedded into the image. Small changes are also not detected by the human eye. High hidden capacity along with high visual quality is provided by the pixel value differencing (PVD) method. This paper first proposes the method of interpolation between the p
APA, Harvard, Vancouver, ISO, and other styles
18

Joo, Jeong-Chun. "Histogram estimation-scheme-based steganalysis defeating the steganography using pixel-value differencing and modulus function." Optical Engineering 49, no. 7 (2010): 077001. http://dx.doi.org/10.1117/1.3463021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Hussain, Mehdi, Ainuddin Wahid Abdul Wahab, Anthony T. S. Ho, Noman Javed, and Ki-Hyun Jung. "A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement." Signal Processing: Image Communication 50 (February 2017): 44–57. http://dx.doi.org/10.1016/j.image.2016.10.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Pradhan, Anita, K. Raja Sekhar, and Gandharba Swain. "Adaptive PVD Steganography Using Horizontal, Vertical, and Diagonal Edges in Six-Pixel Blocks." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/1924618.

Full text
Abstract:
The traditional pixel value differencing (PVD) steganographical schemes are easily detected by pixel difference histogram (PDH) analysis. This problem could be addressed by adding two tricks: (i) utilizing horizontal, vertical, and diagonal edges and (ii) using adaptive quantization ranges. This paper presents an adaptive PVD technique using 6-pixel blocks. There are two variants. The proposed adaptive PVD for 2×3-pixel blocks is known as variant 1, and the proposed adaptive PVD for 3×2-pixel blocks is known as variant 2. For every block in variant 1, the four corner pixels are used to hide da
APA, Harvard, Vancouver, ISO, and other styles
21

Newaj Bhuiyan, Sharif Shah, Norun Abdul Malek, Othman Omran Khalifa, and Farah Diyana Abdul Rahman. "An Improved Image Steganography Algorithm Based on PVD." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 2 (2018): 569. http://dx.doi.org/10.11591/ijeecs.v10.i2.pp569-577.

Full text
Abstract:
In this paper, a modification of PVD (Pixel value differencing) algorithm is used for Image Steganography in spatial domain. It is normalizing secret data value by encoding method to make the new pixel edge difference less among three neighbors (horizontal, vertical and diagonal) and embedding data only to less intensity pixel difference areas or regions. The proposed algorithm shows a good improvemernt for both color and gray-scale images compared to other algorithms. Color images performance are better than gray images. However, in this work the focus is mainly on gray images. The strenght o
APA, Harvard, Vancouver, ISO, and other styles
22

Sharif, Shah Newaj Bhuiyan, Abdul Malek Norun, Omran Khalifa Othman, and Diyana Abdul Rahman Farah. "An Improved Image Steganography Algorithm based on PVD." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 2 (2018): 569–77. https://doi.org/10.11591/ijeecs.v10.i2.pp569-577.

Full text
Abstract:
In this paper, a modification of PVD (Pixel Value Differencing) algorithm is used for Image Steganography in spatial domain. It is normalizing secret data value by encoding method to make the new pixel edge difference less among three neighbors (horizontal, vertical and diagonal) and embedding data only to less intensity pixel difference areas or regions. The proposed algorithm shows a good improvement for both color and gray-scale images compared to other algorithms. Color images performances are better than gray images. However, in this work the focus is mainly on gray images. The strenght o
APA, Harvard, Vancouver, ISO, and other styles
23

Saravanan, D., N. Sivaprasad, and Dennis Joseph. "Information Trouncing Via Slightest Momentous Spot System Procedure." International Journal of Engineering & Technology 7, no. 3.27 (2018): 488. http://dx.doi.org/10.14419/ijet.v7i3.27.18002.

Full text
Abstract:
The least-significant-bit based approach is a popular type of stenographic algorithms in the spatial domain. However, we find that in most existing approaches, the choice of embedding positions within a cover audio mainly depends on a pseudorandom number generator without considering the relationship between the audio content itself and the size of the secret message. In this paper, we expand the least significant bit matching revisited audio stegnography and propose an edge adaptive scheme which can select the embedding regions according to the size of secret message and the difference betwee
APA, Harvard, Vancouver, ISO, and other styles
24

Jose, Asha, and Kamalraj Subramanian. "High-capacity reversible data hiding using quotient multi pixel value differencing scheme in encrypted images by fuzzy based encryption." Multimedia Tools and Applications 80, no. 19 (2021): 29453–79. http://dx.doi.org/10.1007/s11042-021-11122-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Kocak, Cemal. "CLSM: COUPLE LAYERED SECURITY MODEL A HIGH-CAPACITY DATA HIDING SCHEME USING WITH STEGANOGRAPHY." Image Analysis & Stereology 36, no. 1 (2017): 15. http://dx.doi.org/10.5566/ias.1482.

Full text
Abstract:
Cryptography and steganography are the two significant techniques used in secrecy of communications and in safe message transfer. In this study CLSM – Couple Layered Security Model is suggested which has a hybrid structure enhancing information security using features of cryptography and steganography. In CLSM system; the information which has been initially cryptographically encrypted is steganographically embedded in an image at the next step. The information is encrypted by means of a Text Keyword consisting of maximum 16 digits determined by the user in cryptography method. Similarly, the
APA, Harvard, Vancouver, ISO, and other styles
26

Kumar, P. Mohan, and K. L. Hanmuganathan. "Developing a Secure Image Steganographic System Using TPVD Adaptive LSB Matching Revisited Algorithm for Maximizing the Embedding Rate." Journal of Telecommunications and Information Technology, no. 2 (June 27, 2023): 61–66. http://dx.doi.org/10.26636/jtit.2011.2.1146.

Full text
Abstract:
Steganography is the approach for hiding any secret message in a variety of multimedia carriers like images, audio or video files. Whenever we are hiding a data, it is very important to make it invisible, so that it could be protected. A number of steganographic algorithms have been proposed based on this property of a steganographic system. This paper concentrates on integrating Tri way pixel value differencing approach and LSB matching revisited. The secret data embedded in images were images, text and audio signals so far. The proposed scheme has also come with the executable file as secret
APA, Harvard, Vancouver, ISO, and other styles
27

Pun, Nirmala, and Mamta Juneja. "Chaotic Pixel Value Differencing." International Journal of Image, Graphics and Signal Processing 8, no. 4 (2016): 54–60. http://dx.doi.org/10.5815/ijigsp.2016.04.07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Grajeda-Marín, Ismael R., Héctor A. Montes-Venegas, J. Raymundo Marcial-Romero, J. A. Hernández-Servín, Vianney Muñoz-Jiménez, and Guillermo De Ita Luna. "A New Optimization Strategy for Solving the Fall-Off Boundary Value Problem in Pixel-Value Differencing Steganography." International Journal of Pattern Recognition and Artificial Intelligence 32, no. 01 (2017): 1860010. http://dx.doi.org/10.1142/s0218001418600108.

Full text
Abstract:
In Digital Image Steganography, Pixel-Value Differencing (PVD) methods use the difference between neighboring pixel values to determine the amount of data bits to be inserted. The main advantage of these methods is the size of input data that an image can hold. However, the fall-off boundary problem and the fall in error problem are persistent in many PVD steganographic methods. This results in an incorrect output image. To fix these issues, usually the pixel values are either somehow adjusted or simply not considered to carry part of the input data. In this paper, we enhance the Tri-way Pixel
APA, Harvard, Vancouver, ISO, and other styles
29

Rahim, Robbi, Nuning Kurniasih, Frisma Handayanna, et al. "Enhanced pixel value differencing with cryptography algorithm." MATEC Web of Conferences 197 (2018): 03011. http://dx.doi.org/10.1051/matecconf/201819703011.

Full text
Abstract:
The combination of Steganography and cryptography algorithms can improve the security of data you want to keep secret. Pixel Value Differencing (PVD) algorithm combined with Word Auto Key Encryption (WAKE) algorithm and Modular Multiplication Block Cipher algorithm can produce good ciphertext and inserted on image media by using PVD algorithm that convert each ciphertext into pixel.
APA, Harvard, Vancouver, ISO, and other styles
30

Lu, Hui-Chieh, Yen-Ping Chu, and Min-Shiang Hwang. "New Steganographic Method of Pixel Value Differencing." Journal of Imaging Science and Technology 50, no. 5 (2006): 424. http://dx.doi.org/10.2352/j.imagingsci.technol.(2006)50:5(424).

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Hosam, Osama, and Nadhir Ben Halima. "Adaptive block-based pixel value differencing steganography." Security and Communication Networks 9, no. 18 (2016): 5036–50. http://dx.doi.org/10.1002/sec.1676.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Mansor, Nur Khaleeeda, Syed Muhammad Hazry Asraf, and Syed Zulkarnain Syed Idrus. "Steganographic on Pixel Value Differencing in Iris Biometric." Journal of Physics: Conference Series 1529 (April 2020): 032078. http://dx.doi.org/10.1088/1742-6596/1529/3/032078.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Yang, Cheng-Hsing, Shiuh-Jeng Wang, and Chi-Yao Weng. "Capacity-Raising Steganography Using Multi-Pixel Differencing and Pixel-Value Shifting Operations." Fundamenta Informaticae 98, no. 2-3 (2010): 321–36. http://dx.doi.org/10.3233/fi-2010-229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Putra, Zaim Nabil Alif Tirta, and Agus Prihanto. "Penerapan Steganografi dengan Menggunakan Metode Least Significant Bit (LSB) dan Pixel Value Differencing (PVD) pada Citra Warna." Journal of Informatics and Computer Science (JINACS) 1, no. 03 (2020): 165–73. http://dx.doi.org/10.26740/jinacs.v1n03.p165-173.

Full text
Abstract:
Abstrak - Steganografi merupakan teknik penyembu-nyian pesan kedalam suatu media telah menjadi salah satu Teknik yang banyak digunakan dalam melakukan keamanan terhadap pesan, karena pada zaman modern seperti sekarang ini keamanan suatu informasi menjadi isu yang penting. Sebuah informasi akan menjadi sangat penting untuk dijaga kerahasiaannya apabila hal tersebut berkaitan dengan bisnis maupun keamanan negara. Pada penelitian ini bertujuan untuk meningkatkan kapasitas pesan dan sekaligus berusaha menjaga kulitas gambar dengan menggabungkan metode LSB (Least Significant Bit) untuk 2 pixel yang
APA, Harvard, Vancouver, ISO, and other styles
35

Wu, Da-Chun, and Wen-Hsiang Tsai. "A steganographic method for images by pixel-value differencing." Pattern Recognition Letters 24, no. 9-10 (2003): 1613–26. http://dx.doi.org/10.1016/s0167-8655(02)00402-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Khodaei, Masoumeh, Bahram Sadeghi Bigham, and Karim Faez. "Adaptive Data Hiding, Using Pixel-Value-Differencing and LSB Substitution." Cybernetics and Systems 47, no. 8 (2016): 617–28. http://dx.doi.org/10.1080/01969722.2016.1214459.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Dicky, Nofriansyah, and Rahim Robbi. "COMBINATION OF PIXEL VALUE DIFFERENCING ALGORITHM WITH CAESAR ALGORITHM FOR STEGANOGRAPHY." International Journal Of Research In Science & Engineering 2, no. 6 (2016): 153–59. https://doi.org/10.5281/zenodo.239092.

Full text
Abstract:
Steganography is a method that can be used to secure information. Steganography is hiding information or messages into other media such as digital images, text, voice or video so as not to arouse suspicion of others. Steganography methods that are widely used today still have shortcomings regarding quality, capacity, and robustness. Therefore, it needs steganography methods other better, and to add to the information security, steganography can combine with cryptography. Steganography method used is the method of pixel value differencing (PVD). This approach can insert a message more to the pi
APA, Harvard, Vancouver, ISO, and other styles
38

Afizi Mohd Shukran, Mohd, Muhammad Naim Abdullah, Nur Adnin Ahmad Zaidi, et al. "Pixel Value Graphical Password Scheme." International journal of electrical and computer engineering systems 12 (November 2, 2021): 23–29. http://dx.doi.org/10.32985/ijeces.12.si.3.

Full text
Abstract:
Pixel value access control (PVAC) was introduced to deliver a secure and simple graphical password method where it requires users to load their image as their password. PVAC extracts the image to obtain a three-octet 8-bits Red-Green-Blue (RGB) value as its password to authenticate a user. The pixel value must be matched with the record stored in the database or otherwise, the user is failed to authenticate. However, users which prefer to store images on cloud storage would unintentionally alter and as well as the pixel value due to media compression and caused faulty pixels. Thus, the K-Means
APA, Harvard, Vancouver, ISO, and other styles
39

Sinduningrum, Estu, and Anton Supriyanto. "Perancangan Aplikasi Steganografi Berbasis Android dengan Metode Pixel Value Differencing (PVD)." MULTINETICS 2, no. 2 (2016): 16–23. http://dx.doi.org/10.32722/multinetics.v2i2.1032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Lin, Wen-Bin, Tai-Hung Lai, and Chao-Lung Chou. "Chi-square-based steganalysis method against modified pixel-value differencing steganography." Arabian Journal for Science and Engineering 46, no. 9 (2021): 8525–33. http://dx.doi.org/10.1007/s13369-021-05554-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Al-Dhamari, Ahlam K., and Khalid A. Darabkh. "Block-Based Steganographic Algorithm Using Modulus Function and Pixel-Value Differencing." Journal of Software Engineering and Applications 10, no. 01 (2017): 56–77. http://dx.doi.org/10.4236/jsea.2017.101004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Mandal, J. K. "Colour Image Steganography based on Pixel Value Differencing in Spatial Domain." International Journal of Information Sciences and Techniques 2, no. 4 (2012): 83–93. http://dx.doi.org/10.5121/ijist.2012.2408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Sinduningrum, Estu, and Anton Supriyanto. "Perancangan Aplikasi Steganografi Berbasis Android dengan Metode Pixel Value Differencing (PVD)." MULTINETICS 2, no. 2 (2016): 16. http://dx.doi.org/10.32722/multinetics.vol2.no.2.2016.pp.16-23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Sinduningrum, Estu, and Anton Supriyanto. "Perancangan Aplikasi Steganografi Berbasis Android dengan Metode Pixel Value Differencing (PVD)." MULTINETICS 2, no. 2 (2016): 16. http://dx.doi.org/10.32722/vol2.no2.2016.pp16-23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Zhang Hanling, and Geng Guangzhi. "Data Hiding by Adaptive Side-Match Based on Pixel-Value Differencing." INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 4, no. 1 (2012): 460–66. http://dx.doi.org/10.4156/aiss.vol4.issue1.57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Hussain, Mehdi, Qaiser Riaz, Shahzad Saleem, Abdul Ghafoor, and Ki-Hyun Jung. "Enhanced adaptive data hiding method using LSB and pixel value differencing." Multimedia Tools and Applications 80, no. 13 (2021): 20381–401. http://dx.doi.org/10.1007/s11042-021-10652-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Adam, Riza Ibnu, Muhammad Garno, and Muhamad Roba’i. "INTERPOLASI DALAM PROSES PENYISIPAN PESAN DENGAN METODE PIXEL VALUE DIFFERENCING (PVD)." JIKO (Jurnal Informatika dan Komputer) 6, no. 2 (2022): 148. http://dx.doi.org/10.26798/jiko.v6i2.275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Rojali, Ford Lumban Gaol, Edi Abdurahman, and Benfano Soewito. "A High Quality Steganography Method with Twenty Five-Pixel Value Differencing." Journal of Computer Science 15, no. 10 (2019): 1538–45. http://dx.doi.org/10.3844/jcssp.2019.1538.1545.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Liu, Jen-Chang, and Ming-Hong Shih. "Generalizations of Pixel-Value Differencing Steganography for Data Hiding in Images." Fundamenta Informaticae 83, no. 3 (2008): 319–35. https://doi.org/10.3233/fun-2008-83305.

Full text
Abstract:
Generalizations of the pixel-value differencing (PVD) method for data hiding in graylevel images are proposed. Two extensions of the PVD method are analyzed: the block-based approach and the Haar-based approach. For the block-based PVD, the cover image is divided into non-overlapping horizontal or square blocks of n pixels. In each block, n − 1 differences are calculated between consecutive pixels. These differences are classified to embed the secret message. For the Haar-based PVD, the 2-D integer Haar wavelet is applied to decomposed the cover image. The high-frequency components are used to
APA, Harvard, Vancouver, ISO, and other styles
50

Li, Zhaotong, and Ying He. "Steganography with pixel-value differencing and modulus function based on PSO." Journal of Information Security and Applications 43 (December 2018): 47–52. http://dx.doi.org/10.1016/j.jisa.2018.10.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!