Have a personal or library account? Click to login
A New Digital Image Steganography Based on Center Embedded Pixel Positioning Cover

A New Digital Image Steganography Based on Center Embedded Pixel Positioning

Open Access
|Jul 2021

References

  1. 1. Desoky, A. Noiseless Steganography. CRC Press, 2012.
  2. 2. Abd El-Latif, A. A., B. Abd El-Att, S. E. Venegas-Andraca. A Novel Image Steganography Technique Based on Quantum Substitution Boxes. – Optics and Laser Technology, Vol. 116, 2019, pp. 92-102.<a href="https://doi.org/10.1016/j.optlastec.2019.03.005" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.optlastec.2019.03.005</a>
  3. 3. Al-Afandy, K. A., O. S. Faragallah, A. Elmhalawy, E. S. M. El-Rabaie, G. M. El-Banby. High Security Data Hiding Using Image Cropping and LSB Least Significant Bit Steganography. – In: 4th International Colloquium on Information Science and Technology (CIST’16), IEEE, 2016, pp. 400-404.<a href="https://doi.org/10.1109/CIST.2016.7805079" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/CIST.2016.7805079</a>
  4. 4. Kumar, V., D. Kumar. Digital Image Steganography Based on Combination of DCT and DWT. – Communications in Computer and Information Science, Vol. 101, 2010, pp. 596-601.<a href="https://doi.org/10.1007/978-3-642-15766-0_102" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1007/978-3-642-15766-0_102</a>
  5. 5. Kumar, S. K., P. D. K. Reddy, G. Ramesh, V. R. Maddumla. Image Transformation Technique Using Steganography Methods Using LWT Technique. – International Information and Engineering Technology Assocation, Vol. 36, 2019, No 3, pp. 233-237.<a href="https://doi.org/10.18280/ts.360305" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.18280/ts.360305</a>
  6. 6. Juarez-Sandoval, O., M. Cedillo-Hernandez, G. Sanchez-Perez, K. Toscano-Medina, H. Perez-Meana, M. Nakano-Miyatake. Compact Image Steganalysis for LSB-Matching Steganography. – In: Proc. of 5th International Workshop on Biometrics and Forensics, IWBF, 2017.<a href="https://doi.org/10.1109/IWBF.2017.7935103" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/IWBF.2017.7935103</a>
  7. 7. Kadhim, I. J., P. Premaratne, P. J. Vial, B. Halloran. Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research. – Neurocomputing, Vol. 335, 2019, pp. 299-326.<a href="https://doi.org/10.1016/j.neucom.2018.06.075" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.neucom.2018.06.075</a>
  8. 8. Mishra, M., P. Mishra, M. C. Adhikary. Digital Image Data Hiding Techniques: A Comparative Study. – Ansvesa, Vol. 7, 2014, No 2, pp. 105-115.
  9. 9. Mishra, B., R. Beg, V. P. Singh. Information Security through Digital Image Steganography Using Multilevel and Compression Technique. – MIT International Journal of Computer Science & Information Technology, Vol. 3, 2013, No 1, pp. 26-29.
  10. 10. Hu, D., L. Wang, W. Jiang, S. Zheng, B. Li. A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks. – IEEE Transactions on Information Forensics and Security, Vol. 6, 2018, pp. 38303-38314.<a href="https://doi.org/10.1109/ACCESS.2018.2852771" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/ACCESS.2018.2852771</a>
  11. 11. Singh, S., R. Beg, T. J. Siddiqui. Robust Image Steganography Using Complex Wavelet Transform. – In: Proc. of International Multimedia, Signal Processing and Communication Technologies, IMPACT, 2013, pp. 56-30.<a href="https://doi.org/10.1109/MSPCT.2013.6782087" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/MSPCT.2013.6782087</a>
  12. 12. Hussain, M., A. W. A. Wahab, Y. I. Bin Idris, A. T. S. Ho, T. S. Jung. Image Steganography in Spatial Domain: A Survey. – Signal Processing: Image Communication Vol. 65, 2018, pp. 46-66.
  13. 13. Zhou, Z., Y. Mu, Q. M. J. Wu. Coverless Image Steganography Using Partial-Duplicate Image Retrieval. – Soft Computing, Vol. 23, 2019, No 23, pp. 4927-4938.<a href="https://doi.org/10.1007/s00500-018-3151-8" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1007/s00500-018-3151-8</a>
  14. 14. Darwis, D., A. Junaidi, Wamiliana. A New Approach of Steganography Using Center Sequential Technique. – In: Journal of Physics: Conference Series. Vol. 1338. 2019.<a href="https://doi.org/10.1088/1742-6596/1338/1/012063" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1088/1742-6596/1338/1/012063</a>
  15. 15. Juarez-Sandoval, O., A. Fierro-Radilla, A. Espejel-Trujillo, M. Nakano-Miyatake, H. Perez-Meana. Cropping and Noise Resilient Steganography Algorithm Using Secret Image Sharing. – In: Proc. of 6th International Conference on Graphic and Image Processing (ICGIP’14), Vol. 9443, 2015.<a href="https://doi.org/10.1117/12.2179745" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1117/12.2179745</a>
  16. 16. Akar, F., Y. Yalman, H. S. Varol. Data Hiding in Digital Images Using a Partial Optimization Technique Based on the Classical LSB Method. – Turkish Journal of Electrical Engineering and Computer Sciences, Vol. 21, 2013, pp. 2037-2047.<a href="https://doi.org/10.3906/elk-1205-58" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.3906/elk-1205-58</a>
  17. 17. Setiadi, D. R. I. M., J. Jumanto. An Enhanced LSB-Image Steganography Using the Hybrid Canny-Sobel Edge Detection. – Cybernetics and Information Technologies, Vol. 18, 2018, No 2, pp. 74-88.<a href="https://doi.org/10.2478/cait-2018-0029" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.2478/cait-2018-0029</a>
  18. 18. Swain, G., S. K. Lenka. A Novel Steganography Technique by Mapping Words with LSB Array. – International Journal of Signal and Imaging Systems Engineering, Vol. 8, 2015, No 1-2, pp. 115-122.<a href="https://doi.org/10.1504/IJSISE.2015.067052" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1504/IJSISE.2015.067052</a>
  19. 19. Alhumyani, H. Efficient Image Cipher Based on Baker Map in the Discrete Cosine Transform. – Cybernetics and Information Technologies, Vol. 20, 2020, No 1, pp. 68-81.<a href="https://doi.org/10.2478/cait-2020-0005" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.2478/cait-2020-0005</a>
  20. 20. Wamiliana, M. Usman, A. Hijriani, Warsito, R. Setiawan. The Hybrid Methods of Column Transposition with Adaptive Minimum Error Least Significant Bit Replacement (AMELSBR) Using File jpg/jpeg and png. – International Journal of Computer Science and Network Security, Vol. 17, 2017, No 7, pp. 174-179.
  21. 21. Zhang, Y., C. Qin, W. Zhang, F. Liu, X. Luo. On the Fault-Tolerant Performance for a Class of Robust Image Steganography. – Signal Processing, Vol. 146, 2018, pp. 99-111.<a href="https://doi.org/10.1016/j.sigpro.2018.01.011" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.sigpro.2018.01.011</a>
  22. 22. Zhang, X., F. Peng, M. Long. Robust Coverless Image Steganography Based on DCT and LDA Topic Classification. – IEEE Transactions on Multimedia. Vol. 20, 2018, No 12, pp. 3223-3238.<a href="https://doi.org/10.1109/TMM.2018.2838334" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/TMM.2018.2838334</a>
  23. 23. Wu, P., Y. Yang, X. Li. StegNet: Mega Image Steganography Capacity with Deep Convolutional Network. – Future Internet, Vol. 10, 2018, pp. 1-15.<a href="https://doi.org/10.3390/fi10060054" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.3390/fi10060054</a>
  24. 24. Sahu, A. K., G. Swain, E. S. Babu. Digital Image Steganography Using Bit Flipping. – Cybernetics and Information Technologies, Vol. 18, 2018, No 1, pp. 69-80.<a href="https://doi.org/10.2478/cait-2018-0006" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.2478/cait-2018-0006</a>
DOI: https://doi.org/10.2478/cait-2021-0021 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 89 - 104
Submitted on: Dec 15, 2020
Accepted on: Apr 28, 2021
Published on: Jul 1, 2021
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 times per year

© 2021 Dedi Darwis, Akmal Junaidi, Dewi Asiah Shofiana, Wamiliana,, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.