Computer Science ›› 2025, Vol. 52 ›› Issue (6A): 240600024-8.doi: 10.11896/jsjkx.240600024
• Information Security • Previous Articles Next Articles
FU Jiajia1, HUANG Donghai1, LU Jiangang1, DENG Xiaozhi1, KANG Zhongmiao1, LIU Yun2
CLC Number:
[1]LIU Y,LIU S,WANG Y,et al.Video steganography:A review[J].Neurocomputing,2019,335:238-250. [2]HUSSAIN M,WAHAB A W A,BIN IDRIS Y I,et al.Image steganography in spatial domain:A survey[J].Signal Processing-Image Communication,2018,65:46-66. [3]BENDER W,GRUHL D,MORIMOTO N,et al.Techniques for data hiding[J].IBM Systems Journal,1996,35(3.4):313-336. [4]MIELIKAINEN J.LSB matching revisited[J].IEEE Signal Processing Letters,2006,13(5):285-287. [5]TAVARES R,MADEIRO F.Word-Hunt:A LSB steganography method with low expected number of modifications per pixel[J].IEEE Latin America Transactions,2016,14(2):1058-1064. [6]ELHARROUSS O,ALMAADEED N,AL-MAADEED S.Animage steganography approach based on k-least significant bits(k-LSB)[C]//2020 IEEE International Conference on Informatics,IoT,and Enabling Technologies(ICIoT).IEEE,2020:131-135. [7]ZHANG X,WANG S.Efficient steganographic embedding byexploiting modification direction[J].IEEE Communications Letters,2006,10(11):781-783. [8]KIM H J,KIM C,CHOI Y,et al.Improved modification direction methods[J].Computers & Mathematics with Applications,2010,60(2):319-325. [9]SHEN S Y,HUANG L H.A data hiding scheme using pixel value differencing and improving exploiting modification directions[J].Computers & Security,2015,48:131-141. [10]LIU Y J,CHANG C C,HUANG P C.Extended exploiting-modi-fication-direction data hiding with high capacity[C]//Proceedings of the International Conference on Video and Image Processing.ACM,2017:151-155. [11]WU D C,TSAI W H.A steganographic method for images by pixel-value differencing[J].Pattern Recognition Letters,2003,24(9/10):1613-1626. [12]YANG C H,WENG C Y,WANG S J,et al.Varied PVD+LSB evading detection programs to spatial domain in data embedding systems[J].Journal of Systems and Software,2010,83(10):1635-1643. [13]KHODAEI M,FAEZ K.New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing[J].IET Image Processing,2012,6(6):677-686. [14]HUSSAIN M,WAHAB A W A,JAVED N,et al.Recursive information hiding scheme through LSB,PVD Shift,and MPE[J].IETE Technical Review,2018,35(1):53-63. [15]CHANG C,CHOU Y,KIEU T.An information hiding scheme using Sudoku[C]//Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control.IEEE,2008. [16]CHANG C C,LIU Y J,NGUYEN T S.A novel Turtle Shell based scheme for data Hiding[C]//Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.IEEE,2014:89-93. [17]XIA B B,WANG A H,CHANG C C,et al.An image steganography scheme using 3D-Sudoku[J].Journal of Information Hiding and Multimedia Signal Processing,2016,7(4):836-845. [18]XIE X Z,LIN C C,CHANG C C.Data hiding based on a two-layer Turtle Shell matrix[J].Symmetry,2018,10(2):47. [19]HE M,LIU Y,CHANG C,et al.A Mini-Sudoku matrix-based data embedding scheme with high payload[J].IEEE Access,2019,7:141414-141425. [20]HORNG J H,XU S,CHANG C C,et al.An efficient data-hiding scheme based on multidimensional Mini-SuDoKu[J].Sensors,2020,20(9):2739. [21]LIN J Y,CHEN Y,CHANG C C,et al.A novel high capacity turtle shell-based data hiding with location table free[J].International Journal of Computational Science and Engineering,2020,22(1):135-145. [22]SREENIVAS K,KAMKSHI PRASAD V.Fragile watermarking schemes for image authentication:a survey[J].International Journal of Machine Learning and Cybernetics,2018,9(7):1193-1218. [23]FELGENHAUER B,JARVIS F.Mathematics of Sudoku I[J].Mathematical Spectrum,2006,39:15-22. [24]ALLAN W.The USC-SIPI Image Database[EB/OL].http://sipi.usc.edu/database/database.php. [25]ZHANG X P,WANG S Z.Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security[J].Pattern Recognition Letters,2004,25(3):331-339. [26]FRIDRICH J,GOLJAN M.Practical steganalysis of digital images:state of the art[C]//Security and Watermarking of Multimedia Contents IV.SPIE,2002,4675:1-13. [27]LIU Y,CHANG C C,NGUYEN T S.High capacity turtle shell-based data hiding[J].IET Image Processing,2016,10(2):130-137. |
[1] | LIU Runjun, XIAO Fengjun, HU Weitong, WANG Xu. Reversible Data Hiding in Fully Encrypted Images Based on Pixel Interval Partitioning andPrediction Recovery [J]. Computer Science, 2025, 52(6A): 240900030-8. |
[2] | LI Fei, CHEN Tong. Survivability Evaluation of National Defense Engineering Power System Grid Considering MultipleAttack Strategies [J]. Computer Science, 2024, 51(6A): 230700171-8. |
[3] | ZHOU Yiteng, TANG Xin, JIN Luchao. Adaptive MSB Reversible Data Hiding Based Security Deduplication for Encrypted Images in Cloud Storage [J]. Computer Science, 2024, 51(12): 352-360. |
[4] | LIU Dingcai, WU Haotian, ZHUANG Zhenwei, HE Junhui. Reversible Data Hiding Scheme in NTRU Encrypted Domain Based on Polynomial Partition [J]. Computer Science, 2023, 50(8): 294-303. |
[5] | HAO Jie, PING Ping, FU De-yin, ZHAO Hong-ze. Bi-histogram Shifting Reversible Data Hiding Method After Compressed Differences [J]. Computer Science, 2022, 49(9): 340-346. |
[6] | Renata WONG. Application of Early Quantum Algorithms in Quantum Communication,Error Correction and Other Fields [J]. Computer Science, 2022, 49(6A): 645-648. |
[7] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[8] | GAO Ji-hang, ZHANG Yan. Fault Diagnosis of Shipboard Zonal Distribution Power System Based on FWA-PSO-MSVM [J]. Computer Science, 2022, 49(11A): 210800209-5. |
[9] | JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313. |
[10] | MA Bin, HOU Jin-cheng, WANG Chun-peng, LI Jian, SHI Yun-qing. High Capacity Reversible Data Hiding Algorithm for Audio Files Based on Code Division Multiplexing [J]. Computer Science, 2021, 48(9): 298-305. |
[11] | WU Shao-qian, LI Xi-ming. Authenticable Encrypted Secure Communication Based on Adversarial Network [J]. Computer Science, 2021, 48(5): 328-333. |
[12] | WANG Chun-dong, LUO Wan-wei, MO Xiu-liang, YANG Wen-jun. Survey on Mutual Trust Authentication and Secure Communication of Internet of Vehicles [J]. Computer Science, 2020, 47(11): 1-9. |
[13] | LIU Meng-jun, SHA Tao, LI Dan, LIU Shu-bo. Reliable Security Lock Key Updating Scheme over Narrow Band Internet of Things [J]. Computer Science, 2019, 46(4): 137-143. |
[14] | WU Zhong-zhi, WANG Lei, MA Jian-ping, TAN Si-yang, GUO Man-yi. Design of Typical Quadrotor UAV Based on System Architecture [J]. Computer Science, 2019, 46(11A): 575-579. |
[15] | LIU Yu, YANG Bai-long, ZHAO Wen-qiang, YUAN Zhi-hua. Adaptive Pixel Block Reference Value Based Reversible Data Hiding in Encrypted Domain [J]. Computer Science, 2018, 45(8): 151-155. |
|