Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP
Since the inception of pixel value differencing (PVD) image steganography, it has drawn considerable interest among the researchers of this field. However, most of the PVD based techniques suffer from either falling-off boundary problem (FOBP) or incorrect extraction problem (IEP). Therefore, to add...
Gespeichert in:
| Veröffentlicht in: | Journal of information security and applications Jg. 58; S. 102808 |
|---|---|
| Hauptverfasser: | , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Elsevier Ltd
01.05.2021
|
| Schlagworte: | |
| ISSN: | 2214-2126 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Since the inception of pixel value differencing (PVD) image steganography, it has drawn considerable interest among the researchers of this field. However, most of the PVD based techniques suffer from either falling-off boundary problem (FOBP) or incorrect extraction problem (IEP). Therefore, to address these two issues, this paper proposes a multi-directional pixel value differencing and modulus function (MDPVDMF) based technique. During the embedding process, the original image (OI) is partitioned into 2 × 2 size pixel blocks. Then, data embedding is performed by exploiting the horizontal, vertical, and diagonal directions for each block. For a 2 × 2 pixel block, two difference values can be obtained in any of the three directions. Next, using the difference values and the remainders of the pixel pairs, the secret bits are embedded. The experiment has been conducted to compute the performance of the proposed technique with regards to the image quality metrics like peak signal-to-noise ratio (PSNR), embedding capacity (EC), and FOBP. Results show that PSNR is optimal for vertical pairs with 39.17 dB whereas the EC is optimal for the diagonal pairs with 3.10 bits per pixel (BPP). Further, the proposed technique has shown exceptional attack resistance ability to regular & singular (RS) attack, salt & pepper (S&P) noise, pixel difference histogram (PDH) analysis, and subtractive pixel adjacency matrix (SPAM) steganalysis. |
|---|---|
| AbstractList | Since the inception of pixel value differencing (PVD) image steganography, it has drawn considerable interest among the researchers of this field. However, most of the PVD based techniques suffer from either falling-off boundary problem (FOBP) or incorrect extraction problem (IEP). Therefore, to address these two issues, this paper proposes a multi-directional pixel value differencing and modulus function (MDPVDMF) based technique. During the embedding process, the original image (OI) is partitioned into 2 × 2 size pixel blocks. Then, data embedding is performed by exploiting the horizontal, vertical, and diagonal directions for each block. For a 2 × 2 pixel block, two difference values can be obtained in any of the three directions. Next, using the difference values and the remainders of the pixel pairs, the secret bits are embedded. The experiment has been conducted to compute the performance of the proposed technique with regards to the image quality metrics like peak signal-to-noise ratio (PSNR), embedding capacity (EC), and FOBP. Results show that PSNR is optimal for vertical pairs with 39.17 dB whereas the EC is optimal for the diagonal pairs with 3.10 bits per pixel (BPP). Further, the proposed technique has shown exceptional attack resistance ability to regular & singular (RS) attack, salt & pepper (S&P) noise, pixel difference histogram (PDH) analysis, and subtractive pixel adjacency matrix (SPAM) steganalysis. |
| ArticleNumber | 102808 |
| Author | Swain, Gandharba Sahu, Aditya Kumar Hemalatha, J. Sahu, Monalisa |
| Author_xml | – sequence: 1 givenname: Aditya Kumar surname: Sahu fullname: Sahu, Aditya Kumar email: adityasahu.cse@gmail.com, adityakumar.s@gmrit.edu.in organization: Department of Computer Science and Engineering, GMRIT, Rajam, Andhra Pradesh, 532127, India – sequence: 2 givenname: Gandharba surname: Swain fullname: Swain, Gandharba organization: Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, Andhra Pradesh, 522502, India – sequence: 3 givenname: Monalisa surname: Sahu fullname: Sahu, Monalisa organization: School of Engineering and Technology (CSE), GIET University, Gunupur, Odisha, 765022, India – sequence: 4 givenname: J. surname: Hemalatha fullname: Hemalatha, J. organization: Department of Computer Science and Engineering, AAA college of Engineering and Technology, Amathur, Sivakasi, Tamilnadu, 626123, India |
| BookMark | eNp9kMtOwzAQRb0oEqX0B1j5B1Js5y2xgdJCpaJ2AWzNxHaKQ2pXdlKpf0_SsGLR1UhXc0Zzzw0aGWsUQneUzCihyX01q7SHGSOMdgHLSDZCY8ZoFDDKkms09b4ihFBG85iFY_T11taNDqR2SjTaGqhxUVvxgwvwSuLt5zMGI_HeyrZuPS5bc17Deg87hX2jdmDszsHh-4Qbi-FotcTLzdP2jK0W21t0VULt1fRvTtDHcvE-fw3Wm5fV_HEdiJCQJkgFjRORZCqVBYSFLFlY0lyAyCGPZdolwBIaJQmLVBrGBGgEpAAappIVMibhBGXDXeGs906VXOgG-l8bB7rmlPBeEK94L4j3gvggqEPZP_Tgun7udBl6GCDVlTpq5bgXWhmhBpVcWn0J_wUKnoM5 |
| CitedBy_id | crossref_primary_10_1007_s11042_022_12677_7 crossref_primary_10_1109_LSP_2025_3585824 crossref_primary_10_1109_ACCESS_2021_3136883 crossref_primary_10_1145_3694965 crossref_primary_10_1007_s11042_023_17927_w crossref_primary_10_1007_s11042_022_13015_7 crossref_primary_10_1109_ACCESS_2021_3132424 crossref_primary_10_1007_s11042_023_17887_1 crossref_primary_10_1016_j_eswa_2025_128251 crossref_primary_10_1016_j_jksuci_2021_10_007 crossref_primary_10_1109_ACCESS_2025_3582159 crossref_primary_10_1080_1206212X_2025_2484763 crossref_primary_10_1109_ACCESS_2022_3181179 crossref_primary_10_1007_s11220_021_00360_4 crossref_primary_10_1117_1_JEI_32_5_053001 |
| Cites_doi | 10.1007/s11042-017-5056-4 10.3233/FI-2012-714 10.5121/csit.2012.2211 10.1109/TIFS.2010.2045842 10.1016/j.eij.2014.06.001 10.1016/j.jss.2007.01.049 10.1109/TIFS.2012.2190402 10.1007/s11042-018-6766-y 10.4304/jetwi.2.1.56-64 10.1016/j.compeleceng.2015.01.004 10.1016/S0167-8655(02)00402-6 10.1007/s11554-017-0719-y 10.3390/sym8060041 10.1109/LSP.2006.870357 10.3390/app8112199 10.1049/iet-ipr.2011.0059 10.1109/TIFS.2010.2041812 10.1007/s11432-014-5073-0 10.1080/01969722.2016.1214459 10.1007/s11042-019-7166-7 10.1109/TIFS.2017.2710946 10.1016/j.sigpro.2014.08.022 10.1080/13682199.2017.1355089 10.1016/j.sigpro.2009.08.010 10.1016/j.cose.2014.07.008 10.1109/ACCESS.2019.2960254 10.1049/ip-vis:20059022 |
| ContentType | Journal Article |
| Copyright | 2021 Elsevier Ltd |
| Copyright_xml | – notice: 2021 Elsevier Ltd |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.jisa.2021.102808 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| ExternalDocumentID | 10_1016_j_jisa_2021_102808 S221421262100048X |
| GroupedDBID | --M .~1 1~. 4.4 457 4G. 5VS 7-5 8P~ AACTN AAEDT AAEDW AAFJI AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO AAYFN ABBOA ABMAC ABXDB ABYKQ ACDAQ ACGFS ACRLP ACZNC ADBBV ADEZE AEBSH AEKER AFKWA AFTJW AGHFR AGUBO AIALX AIEXJ AIKHN AITUG AJBFU AJOXV AKYCK ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOMHK AOUOD AVARZ AXJTR BKOJK BLXMC EBS EFJIC EFLBG EJD FDB FIRID FNPLU FYGXN GBLVA GBOLZ KOM M41 MO0 OAUVE P-8 P-9 PC. PRBVW RIG ROL SPC SPCBC SSB SSO SSV SSZ T5K ~G- AATTM AAXKI AAYWO AAYXX ACLOT ACVFH ADCNI AEIPS AEUPX AFJKZ AFPUW AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS |
| ID | FETCH-LOGICAL-c300t-7c156c68e7dba3bdf23f19cac9a95d73bda26146624e7350a14a0ba137d2bd503 |
| ISICitedReferencesCount | 41 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000647708400002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2214-2126 |
| IngestDate | Tue Nov 18 21:26:22 EST 2025 Wed Nov 05 20:43:46 EST 2025 Fri Feb 23 02:47:08 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Image steganography Steganalysis Pixel value differencing (PVD) Modulus function (MF) |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c300t-7c156c68e7dba3bdf23f19cac9a95d73bda26146624e7350a14a0ba137d2bd503 |
| ParticipantIDs | crossref_citationtrail_10_1016_j_jisa_2021_102808 crossref_primary_10_1016_j_jisa_2021_102808 elsevier_sciencedirect_doi_10_1016_j_jisa_2021_102808 |
| PublicationCentury | 2000 |
| PublicationDate | May 2021 2021-05-00 |
| PublicationDateYYYYMMDD | 2021-05-01 |
| PublicationDate_xml | – month: 05 year: 2021 text: May 2021 |
| PublicationDecade | 2020 |
| PublicationTitle | Journal of information security and applications |
| PublicationYear | 2021 |
| Publisher | Elsevier Ltd |
| Publisher_xml | – name: Elsevier Ltd |
| References | Lu, Tseng, Wu (bib0014) 2015; 108 Fridrich, Kodovsky (bib0036) 2012; 7 Mandal, J. K., & Das, D. (2012). Steganography using adaptive pixel value differencing (APVD) of gray images through exclusion of overflow/underflow. USC-SIPI Image Database. [Online]. Available Rodriguez-Perez, Morales-Reyes, Cumplido, Feregrino-Uribe (bib0034) 2015; 43 Abdulla, Sellahewa, Jassim (bib0004) 2019; 78 Khodaei, Faez (bib0024) 2012; 6 Zhang, Ping, Xu, Wang (bib0033) 2014; 57 Wu, Tsai (bib0017) 2003; 24 Kim, Yoon, Ryu, Jung (bib0020) 2019; 9038650 Liu, Lin, Lee (bib0022) 2019; 78 Maleki, Jalali, Jahan (bib0030) 2014; 15 Gutub, Al-Qahtani, Tabakh (bib0009) 2009 Gu, Guo (bib0005) 2019; 78 Accessed on 12 September 2018. Hussain, Wahab, W., Javed, Jung (bib0010) 2016; 8 Hameed, Hassaballah, Aly, Awad (bib0027) 2019; 7 Mielikainen (bib0013) 2006; 13 Fridrich, Goljan (bib0011) April 2002; 4675 Hameed, Aly, Hassaballah (bib0018) 2017; 77 Hussain, Wahab, Idris, Ho, Jung (bib0002) 2018; 65 Gutub (bib0007) 2010; 2 Shen, Huang (bib0031) 2015; 48 Wu, Wu, Tsai, Hwang (bib0023) 2005; 152 Cheddad, Condell, Curran, Mc Kevitt (bib0001) 2010; 90 Luo, Huang, Huang (bib0016) 2010; 5 Wu, Hwang (bib0006) 2017; 65 Joo, Lee, Lee (bib0029) 2010; 249826 Ye, Ni, Yi (bib0037) 2017; 12 . Sharp (bib0012) 2001 Jung (bib0026) 2018; 14 Hussain, Wahab, Ho, Javed, Jung (bib0019) 2017; 50 Zakaria, Hussain, Wahab, Idris, Abdullah, Jung (bib0003) 2018; 8 Liao, Wen, Zhao, Zhang (bib0032) 2012; 118 Wang, Wu, Tsai, Hwang (bib0028) 2008; 81 Pevny, Bas, Fridrich (bib0035) 2010; 5 Abu-Marie, Gutub, Abu-Mansour (bib0008) 2010; 1 Lu, Hsu (bib0015) 2008; 3 Khodaei, Sadeghi, Faez (bib0025) 2016; 47 Liao (10.1016/j.jisa.2021.102808_bib0032) 2012; 118 Pevny (10.1016/j.jisa.2021.102808_bib0035) 2010; 5 Kim (10.1016/j.jisa.2021.102808_bib0020) 2019; 9038650 Maleki (10.1016/j.jisa.2021.102808_bib0030) 2014; 15 Wang (10.1016/j.jisa.2021.102808_bib0028) 2008; 81 Fridrich (10.1016/j.jisa.2021.102808_bib0011) 2002; 4675 Gutub (10.1016/j.jisa.2021.102808_bib0009) 2009 Lu (10.1016/j.jisa.2021.102808_bib0014) 2015; 108 Zakaria (10.1016/j.jisa.2021.102808_bib0003) 2018; 8 Gu (10.1016/j.jisa.2021.102808_bib0005) 2019; 78 Wu (10.1016/j.jisa.2021.102808_bib0017) 2003; 24 Khodaei (10.1016/j.jisa.2021.102808_bib0024) 2012; 6 Cheddad (10.1016/j.jisa.2021.102808_bib0001) 2010; 90 Hussain (10.1016/j.jisa.2021.102808_bib0019) 2017; 50 Khodaei (10.1016/j.jisa.2021.102808_bib0025) 2016; 47 Wu (10.1016/j.jisa.2021.102808_bib0023) 2005; 152 Fridrich (10.1016/j.jisa.2021.102808_bib0036) 2012; 7 Hameed (10.1016/j.jisa.2021.102808_bib0018) 2017; 77 Jung (10.1016/j.jisa.2021.102808_bib0026) 2018; 14 10.1016/j.jisa.2021.102808_bib0021 Ye (10.1016/j.jisa.2021.102808_bib0037) 2017; 12 Abdulla (10.1016/j.jisa.2021.102808_bib0004) 2019; 78 Gutub (10.1016/j.jisa.2021.102808_bib0007) 2010; 2 Rodriguez-Perez (10.1016/j.jisa.2021.102808_bib0034) 2015; 43 Zhang (10.1016/j.jisa.2021.102808_bib0033) 2014; 57 Hussain (10.1016/j.jisa.2021.102808_bib0010) 2016; 8 Liu (10.1016/j.jisa.2021.102808_bib0022) 2019; 78 Lu (10.1016/j.jisa.2021.102808_bib0015) 2008; 3 Shen (10.1016/j.jisa.2021.102808_bib0031) 2015; 48 Wu (10.1016/j.jisa.2021.102808_bib0006) 2017; 65 Mielikainen (10.1016/j.jisa.2021.102808_bib0013) 2006; 13 Joo (10.1016/j.jisa.2021.102808_bib0029) 2010; 249826 Abu-Marie (10.1016/j.jisa.2021.102808_bib0008) 2010; 1 Sharp (10.1016/j.jisa.2021.102808_bib0012) 2001 10.1016/j.jisa.2021.102808_bib0038 Hussain (10.1016/j.jisa.2021.102808_bib0002) 2018; 65 Luo (10.1016/j.jisa.2021.102808_bib0016) 2010; 5 Hameed (10.1016/j.jisa.2021.102808_bib0027) 2019; 7 |
| References_xml | – volume: 1 start-page: 1 year: 2010 end-page: 9 ident: bib0008 article-title: Image Based Steganography Using Truth Table Based and Determinate Array on RGB Indicator publication-title: International Journal of Signal & Image Processing – volume: 3 start-page: 626 year: 2008 end-page: 631 ident: bib0015 article-title: The Technique of Information Hiding Based on Modification Function and LSB Matching publication-title: 2008 Eighth International Conference on Intelligent Systems Design and Applications – volume: 8 start-page: 1 year: 2016 end-page: 21 ident: bib0010 article-title: Hybrid data hiding scheme using right-most digit replacement and adaptive least significant bit for digital images publication-title: Symmetry – volume: 118 start-page: 281 year: 2012 end-page: 289 ident: bib0032 article-title: A novel steganographic method with four-pixel differencing and modulus function publication-title: Fundamenta Informaticae – volume: 6 start-page: 677 year: 2012 end-page: 686 ident: bib0024 article-title: New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing publication-title: IET Image processing – reference: Mandal, J. K., & Das, D. (2012). Steganography using adaptive pixel value differencing (APVD) of gray images through exclusion of overflow/underflow. – volume: 2 start-page: 56 year: 2010 end-page: 64 ident: bib0007 article-title: Pixel Indicator Technique for RGB Image Steganography publication-title: Journal of Emerging Technologies in Web Intelligence – volume: 5 start-page: 201 year: 2010 end-page: 214 ident: bib0016 article-title: Edge adaptive image steganography based on LSB matching revisited publication-title: IEEE Transactions on information forensics and security – volume: 65 start-page: 371 year: 2017 end-page: 378 ident: bib0006 article-title: A novel LSB data hiding scheme with the lowest distortion publication-title: The Imaging Science Journal – volume: 108 start-page: 77 year: 2015 end-page: 89 ident: bib0014 article-title: Dual imaging-based reversible hiding technique using LSB matching publication-title: Signal Processing – volume: 15 start-page: 115 year: 2014 end-page: 127 ident: bib0030 article-title: Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function publication-title: Egyptian Informatics Journal – volume: 50 start-page: 44 year: 2017 end-page: 57 ident: bib0019 article-title: A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement publication-title: Signal Processing: Image Communication – volume: 14 start-page: 127 year: 2018 end-page: 136 ident: bib0026 article-title: Data hiding scheme improving embedding capacity using mixed PVD and LSB on bi plane publication-title: Journal of Real-Time Image Processing – volume: 7 start-page: 868 year: 2012 end-page: 882 ident: bib0036 article-title: Rich models for steganalysis of digital images publication-title: IEEE Transactions on Information Forensics and Security – volume: 12 start-page: 2545 year: 2017 end-page: 2557 ident: bib0037 article-title: Deep learning hierarchical representations for image steganalysis publication-title: IEEE Transactions on Information Forensics and Security – volume: 7 start-page: 185189 year: 2019 end-page: 185204 ident: bib0027 article-title: An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and PVD-LSB Techniques publication-title: IEEE Access – volume: 24 start-page: 1613 year: 2003 end-page: 1626 ident: bib0017 article-title: A steganographic method for images by pixel-value differencing publication-title: Pattern Recognition Letters – volume: 78 start-page: 12157 year: 2019 end-page: 12181 ident: bib0022 article-title: A digital data hiding scheme based on pixel-value differencing and side match method publication-title: Multimedia Tools and Applications – volume: 57 start-page: 1 year: 2014 end-page: 7 ident: bib0033 article-title: Steganalysis by subtractive pixel adjacency matrix and dimensionality reduction publication-title: Science China Information Sciences – volume: 90 start-page: 727 year: 2010 end-page: 752 ident: bib0001 article-title: Digital image steganography: Survey and analysis of current methods publication-title: Signal processing – volume: 152 start-page: 611 year: 2005 end-page: 615 ident: bib0023 article-title: Image steganographic scheme based on pixel-value differencing and LSB replacement methods publication-title: IEE Proceedings-Vision, Image and Signal Processing – volume: 8 start-page: 1 year: 2018 end-page: 19 ident: bib0003 article-title: High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution publication-title: Applied Sciences – volume: 81 start-page: 150 year: 2008 end-page: 158 ident: bib0028 article-title: A high quality steganographic method with pixel-value differencing and modulus function publication-title: Journal of Systems and Software – start-page: 400 year: 2009 end-page: 403 ident: bib0009 article-title: Triple-A: Secure RGB image steganography based on randomization publication-title: Computer Systems and Applications, 2009. AICCSA 2009 – volume: 43 start-page: 9 year: 2015 end-page: 16 ident: bib0034 article-title: An analysis of computational models for accelerating the subtractive pixel adjacency model computation publication-title: Computers & Electrical Engineering – reference: . Accessed on 12 September 2018. – volume: 77 start-page: 14705 year: 2017 end-page: 14723 ident: bib0018 article-title: An efficient data hiding method based on adaptive directional pixel value differencing (ADPVD) publication-title: Multimedia Tools and Applications – reference: . – volume: 249826 start-page: 1 year: 2010 end-page: 13 ident: bib0029 article-title: Improved steganographic method preserving pixel-value differencing histogram with modulus function publication-title: EURASIP Journal on Advances in Signal Processing, 2010 – volume: 65 start-page: 46 year: 2018 end-page: 66 ident: bib0002 article-title: Image steganography in spatial domain: A survey publication-title: Signal Processing: Image Communication – volume: 5 start-page: 215 year: 2010 end-page: 224 ident: bib0035 article-title: Steganalysis by subtractive pixel adjacency matrix publication-title: IEEE Transactions on information Forensics and Security – volume: 78 start-page: 17799 year: 2019 end-page: 17823 ident: bib0004 article-title: Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images publication-title: Multimedia Tools and Applications – start-page: 13 year: 2001 end-page: 26 ident: bib0012 article-title: An implementation of key-based digital signal steganography publication-title: International Workshop on Information Hiding – volume: 48 start-page: 131 year: 2015 end-page: 141 ident: bib0031 article-title: A data hiding scheme using pixel value differencing and improving exploiting modification directions publication-title: Computers & Security – volume: 47 start-page: 617 year: 2016 end-page: 628 ident: bib0025 article-title: Adaptive Data Hiding, Using Pixel-Value Differencing and LSB Substitution publication-title: Cybernetics and Systems – volume: 13 start-page: 285 year: 2006 end-page: 287 ident: bib0013 publication-title: LSB matching revisited. – volume: 78 start-page: 19681 year: 2019 end-page: 19695 ident: bib0005 publication-title: A study on Subtractive Pixel Adjacency Matrix features. – volume: 4675 start-page: 1 year: April 2002 end-page: 14 ident: bib0011 article-title: Practical steganalysis of digital images: state of the art – volume: 9038650 start-page: 1 year: 2019 end-page: 11 ident: bib0020 article-title: Data-Hiding Scheme Using Multidirectional Pixel-Value Differencing on Colour Images publication-title: Security and Communication Networks – reference: USC-SIPI Image Database. [Online]. Available: – volume: 77 start-page: 14705 issue: 12 year: 2017 ident: 10.1016/j.jisa.2021.102808_bib0018 article-title: An efficient data hiding method based on adaptive directional pixel value differencing (ADPVD) publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-017-5056-4 – volume: 118 start-page: 281 issue: 3 year: 2012 ident: 10.1016/j.jisa.2021.102808_bib0032 article-title: A novel steganographic method with four-pixel differencing and modulus function publication-title: Fundamenta Informaticae doi: 10.3233/FI-2012-714 – ident: 10.1016/j.jisa.2021.102808_bib0021 doi: 10.5121/csit.2012.2211 – volume: 5 start-page: 215 issue: 2 year: 2010 ident: 10.1016/j.jisa.2021.102808_bib0035 article-title: Steganalysis by subtractive pixel adjacency matrix publication-title: IEEE Transactions on information Forensics and Security doi: 10.1109/TIFS.2010.2045842 – volume: 15 start-page: 115 issue: 2 year: 2014 ident: 10.1016/j.jisa.2021.102808_bib0030 article-title: Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function publication-title: Egyptian Informatics Journal doi: 10.1016/j.eij.2014.06.001 – volume: 81 start-page: 150 issue: 1 year: 2008 ident: 10.1016/j.jisa.2021.102808_bib0028 article-title: A high quality steganographic method with pixel-value differencing and modulus function publication-title: Journal of Systems and Software doi: 10.1016/j.jss.2007.01.049 – volume: 7 start-page: 868 issue: 3 year: 2012 ident: 10.1016/j.jisa.2021.102808_bib0036 article-title: Rich models for steganalysis of digital images publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2012.2190402 – volume: 78 start-page: 12157 issue: 9 year: 2019 ident: 10.1016/j.jisa.2021.102808_bib0022 article-title: A digital data hiding scheme based on pixel-value differencing and side match method publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-018-6766-y – start-page: 400 year: 2009 ident: 10.1016/j.jisa.2021.102808_bib0009 article-title: Triple-A: Secure RGB image steganography based on randomization – volume: 2 start-page: 56 issue: 1 year: 2010 ident: 10.1016/j.jisa.2021.102808_bib0007 article-title: Pixel Indicator Technique for RGB Image Steganography publication-title: Journal of Emerging Technologies in Web Intelligence doi: 10.4304/jetwi.2.1.56-64 – volume: 43 start-page: 9 year: 2015 ident: 10.1016/j.jisa.2021.102808_bib0034 article-title: An analysis of computational models for accelerating the subtractive pixel adjacency model computation publication-title: Computers & Electrical Engineering doi: 10.1016/j.compeleceng.2015.01.004 – volume: 3 start-page: 626 year: 2008 ident: 10.1016/j.jisa.2021.102808_bib0015 article-title: The Technique of Information Hiding Based on Modification Function and LSB Matching – volume: 24 start-page: 1613 issue: 9-10 year: 2003 ident: 10.1016/j.jisa.2021.102808_bib0017 article-title: A steganographic method for images by pixel-value differencing publication-title: Pattern Recognition Letters doi: 10.1016/S0167-8655(02)00402-6 – volume: 50 start-page: 44 year: 2017 ident: 10.1016/j.jisa.2021.102808_bib0019 article-title: A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement publication-title: Signal Processing: Image Communication – volume: 14 start-page: 127 issue: 1 year: 2018 ident: 10.1016/j.jisa.2021.102808_bib0026 article-title: Data hiding scheme improving embedding capacity using mixed PVD and LSB on bi plane publication-title: Journal of Real-Time Image Processing doi: 10.1007/s11554-017-0719-y – volume: 8 start-page: 1 issue: 6 year: 2016 ident: 10.1016/j.jisa.2021.102808_bib0010 article-title: Hybrid data hiding scheme using right-most digit replacement and adaptive least significant bit for digital images publication-title: Symmetry doi: 10.3390/sym8060041 – volume: 13 start-page: 285 issue: 5 year: 2006 ident: 10.1016/j.jisa.2021.102808_bib0013 publication-title: LSB matching revisited. IEEE signal processing letters doi: 10.1109/LSP.2006.870357 – volume: 8 start-page: 1 issue: 11 year: 2018 ident: 10.1016/j.jisa.2021.102808_bib0003 article-title: High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution publication-title: Applied Sciences doi: 10.3390/app8112199 – volume: 6 start-page: 677 issue: 6 year: 2012 ident: 10.1016/j.jisa.2021.102808_bib0024 article-title: New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing publication-title: IET Image processing doi: 10.1049/iet-ipr.2011.0059 – start-page: 13 year: 2001 ident: 10.1016/j.jisa.2021.102808_bib0012 article-title: An implementation of key-based digital signal steganography – volume: 5 start-page: 201 issue: 2 year: 2010 ident: 10.1016/j.jisa.2021.102808_bib0016 article-title: Edge adaptive image steganography based on LSB matching revisited publication-title: IEEE Transactions on information forensics and security doi: 10.1109/TIFS.2010.2041812 – volume: 57 start-page: 1 issue: 4 year: 2014 ident: 10.1016/j.jisa.2021.102808_bib0033 article-title: Steganalysis by subtractive pixel adjacency matrix and dimensionality reduction publication-title: Science China Information Sciences doi: 10.1007/s11432-014-5073-0 – volume: 47 start-page: 617 issue: 8 year: 2016 ident: 10.1016/j.jisa.2021.102808_bib0025 article-title: Adaptive Data Hiding, Using Pixel-Value Differencing and LSB Substitution publication-title: Cybernetics and Systems doi: 10.1080/01969722.2016.1214459 – volume: 78 start-page: 17799 issue: 13 year: 2019 ident: 10.1016/j.jisa.2021.102808_bib0004 article-title: Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-019-7166-7 – volume: 65 start-page: 46 year: 2018 ident: 10.1016/j.jisa.2021.102808_bib0002 article-title: Image steganography in spatial domain: A survey publication-title: Signal Processing: Image Communication – volume: 1 start-page: 1 issue: 3 year: 2010 ident: 10.1016/j.jisa.2021.102808_bib0008 article-title: Image Based Steganography Using Truth Table Based and Determinate Array on RGB Indicator publication-title: International Journal of Signal & Image Processing – volume: 12 start-page: 2545 issue: 11 year: 2017 ident: 10.1016/j.jisa.2021.102808_bib0037 article-title: Deep learning hierarchical representations for image steganalysis publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2017.2710946 – volume: 108 start-page: 77 year: 2015 ident: 10.1016/j.jisa.2021.102808_bib0014 article-title: Dual imaging-based reversible hiding technique using LSB matching publication-title: Signal Processing doi: 10.1016/j.sigpro.2014.08.022 – volume: 65 start-page: 371 issue: 6 year: 2017 ident: 10.1016/j.jisa.2021.102808_bib0006 article-title: A novel LSB data hiding scheme with the lowest distortion publication-title: The Imaging Science Journal doi: 10.1080/13682199.2017.1355089 – volume: 4675 start-page: 1 year: 2002 ident: 10.1016/j.jisa.2021.102808_bib0011 article-title: Practical steganalysis of digital images: state of the art publication-title: Security and Watermarking of Multimedia Contents IV, International Society for Optics and Photonics – ident: 10.1016/j.jisa.2021.102808_bib0038 – volume: 90 start-page: 727 issue: 3 year: 2010 ident: 10.1016/j.jisa.2021.102808_bib0001 article-title: Digital image steganography: Survey and analysis of current methods publication-title: Signal processing doi: 10.1016/j.sigpro.2009.08.010 – volume: 48 start-page: 131 year: 2015 ident: 10.1016/j.jisa.2021.102808_bib0031 article-title: A data hiding scheme using pixel value differencing and improving exploiting modification directions publication-title: Computers & Security doi: 10.1016/j.cose.2014.07.008 – volume: 78 start-page: 19681 issue: 14 year: 2019 ident: 10.1016/j.jisa.2021.102808_bib0005 publication-title: A study on Subtractive Pixel Adjacency Matrix features. Multimedia Tools and Applications – volume: 7 start-page: 185189 year: 2019 ident: 10.1016/j.jisa.2021.102808_bib0027 article-title: An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and PVD-LSB Techniques publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2960254 – volume: 9038650 start-page: 1 year: 2019 ident: 10.1016/j.jisa.2021.102808_bib0020 article-title: Data-Hiding Scheme Using Multidirectional Pixel-Value Differencing on Colour Images publication-title: Security and Communication Networks – volume: 152 start-page: 611 issue: 5 year: 2005 ident: 10.1016/j.jisa.2021.102808_bib0023 article-title: Image steganographic scheme based on pixel-value differencing and LSB replacement methods publication-title: IEE Proceedings-Vision, Image and Signal Processing doi: 10.1049/ip-vis:20059022 – volume: 249826 start-page: 1 year: 2010 ident: 10.1016/j.jisa.2021.102808_bib0029 article-title: Improved steganographic method preserving pixel-value differencing histogram with modulus function publication-title: EURASIP Journal on Advances in Signal Processing, 2010 |
| SSID | ssj0001219523 |
| Score | 2.4424691 |
| Snippet | Since the inception of pixel value differencing (PVD) image steganography, it has drawn considerable interest among the researchers of this field. However,... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 102808 |
| SubjectTerms | Image steganography Modulus function (MF) Pixel value differencing (PVD) Steganalysis |
| Title | Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP |
| URI | https://dx.doi.org/10.1016/j.jisa.2021.102808 |
| Volume | 58 |
| WOSCitedRecordID | wos000647708400002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: ScienceDirect Freedom Collection 2021 issn: 2214-2126 databaseCode: AIEXJ dateStart: 20130701 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: false ssIdentifier: ssj0001219523 providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELaWLQcuvBEtD_nALUoVOw8nxxa2FCTKShS0t-DYDu2ym626D3rkpzNjO9mlhQqQuESRk3GimU-e8XgehLxQgscmN3WoQfmGiUqwzYvSYMjVmeSmqIxWttmEODrKR6Ni2Ot9b3NhVhPRNPnFRXH2X0UNYyBsTJ39C3F3k8IA3IPQ4Qpih-sfCd6m1IZOVTk_XwUK62uA-koHw0-v7HnBdKaXk-U8QL3m4h2nGL0DMv8iG1_GGu1SuZqd6uDg_f7QRQ4Phr8xZ30FVjvX3DfFc5VgN47IO3-OPFnaVUnDWzKwcd7ds2_S1TV4DdQneBxymeqd3T3Mu_FDM5UTPAOwkNzddGRwtg4bdN61NsNmHc4EiyDnLAlBvWabK7Yr9n5l8Xd-iPHuGMMA8AtYlyKP8rWq6wIQP-C8OC1nNq1-dINscZEWeZ9s7b0ZjN5u-OlYkdougd2v-NwrFyZ4-WO_tm82bJbju-S2lw7dcyC5R3qmuU_utI08qF_XH5DPVzBDLWaoxQwFzFCQBfWYoS1mqMUM_QkzdDGjFjMUMWPJADMPyceDwfHLw9C33ghVHEWLUCjY16ssN0JXMq50zeOaFUqqQhapFjAiYeudZBlPjIjTSLJERpVksdC80mkUPyL9ZtaYx4TGjOsszmRSqBqrS0qRikobtBRZlelsm7CWYaXydemxPcqkbAMQxyUyuUQml47J2yToaM5cVZZr305bOZTernQMLQE519Dt_CPdE3Jrje-npL84X5pn5KZaLU7n5889wH4AFDieyQ |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Multi-directional+block+based+PVD+and+modulus+function+image+steganography+to+avoid+FOBP+and+IEP&rft.jtitle=Journal+of+information+security+and+applications&rft.au=Sahu%2C+Aditya+Kumar&rft.au=Swain%2C+Gandharba&rft.au=Sahu%2C+Monalisa&rft.au=Hemalatha%2C+J.&rft.date=2021-05-01&rft.pub=Elsevier+Ltd&rft.issn=2214-2126&rft.volume=58&rft_id=info:doi/10.1016%2Fj.jisa.2021.102808&rft.externalDocID=S221421262100048X |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2214-2126&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2214-2126&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2214-2126&client=summon |