Image steganography using uncorrelated color space and its application for security of visual contents in online social networks

Image steganography is a growing research field, where sensitive contents are embedded in images, keeping their visual quality intact. Researchers have used correlated color space such as RGB, where modification to one channel affects the overall quality of stego-images, hence decreasing its suitabi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Future generation computer systems Jg. 86; S. 951 - 960
Hauptverfasser: Muhammad, Khan, Sajjad, Muhammad, Mehmood, Irfan, Rho, Seungmin, Baik, Sung Wook
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Elsevier B.V 01.09.2018
Schlagworte:
ISSN:0167-739X, 1872-7115
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Image steganography is a growing research field, where sensitive contents are embedded in images, keeping their visual quality intact. Researchers have used correlated color space such as RGB, where modification to one channel affects the overall quality of stego-images, hence decreasing its suitability for steganographic algorithms. Therefore, in this paper, we propose an adaptive LSB substitution method using uncorrelated color space, increasing the property of imperceptibility while minimizing the chances of detection by the human vision system. In the proposed scheme, the input image is passed through an image scrambler, resulting in an encrypted image, preserving the privacy of image contents, and then converted to HSV color space for further processing. The secret contents are encrypted using an iterative magic matrix encryption algorithm (IMMEA) for better security, producing the cipher contents. An adaptive LSB substitution method is then used to embed the encrypted data inside the V-plane of HSV color model based on secret key-directed block magic LSB mechanism. The idea of utilizing HSV color space for data hiding is inspired from its properties including de-correlation, cost-effectiveness in processing, better stego image quality, and suitability for steganography as verified by our experiments, compared to other color spaces such as RGB, YCbCr, HSI, and Lab. The quantitative and qualitative experimental results of the proposed framework and its application for addressing the security and privacy of visual contents in online social networks (OSNs), confirm its effectiveness in contrast to state-of-the-art methods. •A secure framework for ensuring the security of visual contents in online social networks.•Image scrambling using a light-weighted image scrambler before data embedding.•Encryption of sensitive contents using iterative magic matrix-based encryption algorithm.•Data hiding using an adaptive LSB substitution method.
AbstractList Image steganography is a growing research field, where sensitive contents are embedded in images, keeping their visual quality intact. Researchers have used correlated color space such as RGB, where modification to one channel affects the overall quality of stego-images, hence decreasing its suitability for steganographic algorithms. Therefore, in this paper, we propose an adaptive LSB substitution method using uncorrelated color space, increasing the property of imperceptibility while minimizing the chances of detection by the human vision system. In the proposed scheme, the input image is passed through an image scrambler, resulting in an encrypted image, preserving the privacy of image contents, and then converted to HSV color space for further processing. The secret contents are encrypted using an iterative magic matrix encryption algorithm (IMMEA) for better security, producing the cipher contents. An adaptive LSB substitution method is then used to embed the encrypted data inside the V-plane of HSV color model based on secret key-directed block magic LSB mechanism. The idea of utilizing HSV color space for data hiding is inspired from its properties including de-correlation, cost-effectiveness in processing, better stego image quality, and suitability for steganography as verified by our experiments, compared to other color spaces such as RGB, YCbCr, HSI, and Lab. The quantitative and qualitative experimental results of the proposed framework and its application for addressing the security and privacy of visual contents in online social networks (OSNs), confirm its effectiveness in contrast to state-of-the-art methods. •A secure framework for ensuring the security of visual contents in online social networks.•Image scrambling using a light-weighted image scrambler before data embedding.•Encryption of sensitive contents using iterative magic matrix-based encryption algorithm.•Data hiding using an adaptive LSB substitution method.
Author Mehmood, Irfan
Sajjad, Muhammad
Rho, Seungmin
Muhammad, Khan
Baik, Sung Wook
Author_xml – sequence: 1
  givenname: Khan
  surname: Muhammad
  fullname: Muhammad, Khan
  email: khan.muhammad.icp@gmail.com, khanmuhammad@sju.ac.kr
  organization: Intelligent Media Laboratory, Digital Contents Research Institute, College of Electronics and Information Engineering, Sejong University, Seoul, Republic of Korea
– sequence: 2
  givenname: Muhammad
  surname: Sajjad
  fullname: Sajjad, Muhammad
  email: muhammad.sajjad@icp.edu.pk
  organization: Digital Image Processing Laboratory, Department of Computer Science, Islamia College Peshawar, Pakistan
– sequence: 3
  givenname: Irfan
  surname: Mehmood
  fullname: Mehmood, Irfan
  email: irfan@sejong.ac.kr
  organization: Department of Computer Science and Engineering, Sejong University, Seoul, Republic of Korea
– sequence: 4
  givenname: Seungmin
  surname: Rho
  fullname: Rho, Seungmin
  email: smrho@sungkyul.edu
  organization: Department of Media Software, Sungkyul University, Anyang, Republic of Korea
– sequence: 5
  givenname: Sung Wook
  surname: Baik
  fullname: Baik, Sung Wook
  email: sbaik@sejong.ac.kr
  organization: Intelligent Media Laboratory, Digital Contents Research Institute, College of Electronics and Information Engineering, Sejong University, Seoul, Republic of Korea
BookMark eNqFkE1LAzEQhoNUsFX_gYf8gV2T_ex6EKT4BQUvCt5CdnZSU7fJkmQrvfnTTa0nD3qZYXjnmY93RibGGiTkgrOUM15drlM1htFhmsUq5TxlWXNEpnxeZ0nNeTkh0yjUSZ03rydk5v2aMcbrnE_J5-NGrpD6gCtp7MrJ4W1HR6_Nio4GrHPYy4AdBdtbR_0gAak0HdXBUzkMvQYZtDVU7VWE0emwo1bRrfaj7CNmAprYqw21ptcmrrKgo2IwfFj37s_IsZK9x_OffEpe7m6fFw_J8un-cXGzTCBnVUjaLGMKEbpaFgqbsq1LkFVeZUU5R2xjLPOqgGwuORbYtF2jIEelWpA1Q9Xmp-TqMBec9d6hEqDD9-3BSd0LzsTeS7EWBy_F3kvBuYheRrj4BQ9Ob6Tb_YddHzCMj201OuFBowHstEMIorP67wFfYXaYnw
CitedBy_id crossref_primary_10_1080_1206212X_2019_1692442
crossref_primary_10_3390_sym14010111
crossref_primary_10_1016_j_ijinfomgt_2018_08_011
crossref_primary_10_1109_ACCESS_2018_2799240
crossref_primary_10_1007_s11042_023_16240_w
crossref_primary_10_1016_j_sigpro_2022_108908
crossref_primary_10_1007_s11042_021_10723_4
crossref_primary_10_1111_exsy_13375
crossref_primary_10_1080_00051144_2019_1624409
crossref_primary_10_1117_1_JEI_32_4_043002
crossref_primary_10_1007_s11042_020_10224_w
crossref_primary_10_1007_s11042_022_13581_w
crossref_primary_10_1109_JIOT_2019_2896120
crossref_primary_10_1007_s00530_020_00665_6
crossref_primary_10_1109_TII_2018_2791944
crossref_primary_10_1016_j_cose_2022_102784
crossref_primary_10_1016_j_neucom_2017_04_083
crossref_primary_10_1007_s11042_019_7731_0
crossref_primary_10_1016_j_ins_2019_03_032
crossref_primary_10_1016_j_future_2018_05_017
crossref_primary_10_1007_s11227_018_2641_x
crossref_primary_10_1007_s12553_021_00602_1
crossref_primary_10_1007_s11042_019_7342_9
crossref_primary_10_1016_j_future_2019_01_047
crossref_primary_10_1007_s11277_018_5868_1
crossref_primary_10_1007_s11042_019_08304_7
crossref_primary_10_1007_s11042_023_15177_4
crossref_primary_10_1007_s11042_017_4420_8
crossref_primary_10_1016_j_jisa_2017_06_005
crossref_primary_10_1109_ACCESS_2017_2780822
crossref_primary_10_1109_TCSVT_2019_2896270
crossref_primary_10_1049_cit2_12053
crossref_primary_10_3233_JIFS_179549
crossref_primary_10_1007_s00500_021_05601_y
crossref_primary_10_4018_IJEHMC_2019100102
crossref_primary_10_1109_ACCESS_2018_2808172
crossref_primary_10_1016_j_comcom_2018_06_001
crossref_primary_10_1109_ACCESS_2018_2834916
crossref_primary_10_1007_s11042_019_7628_y
crossref_primary_10_1007_s11042_017_5590_0
crossref_primary_10_1007_s11042_019_07930_5
crossref_primary_10_3390_s20113108
crossref_primary_10_1049_ipr2_13177
crossref_primary_10_1109_ACCESS_2020_2966889
crossref_primary_10_1016_j_jer_2025_07_008
crossref_primary_10_1007_s00779_021_01630_4
crossref_primary_10_1016_j_ins_2019_01_070
crossref_primary_10_1155_2021_6610678
crossref_primary_10_1007_s11042_022_12273_9
crossref_primary_10_1007_s13369_019_04272_0
crossref_primary_10_1007_s11042_019_7519_2
crossref_primary_10_1155_2021_6351144
Cites_doi 10.1109/MNET.2010.5510913
10.1016/j.patcog.2003.08.007
10.1109/COMST.2014.2350994
10.1016/j.ins.2014.03.118
10.1109/TSP.2003.812753
10.1117/1.JEI.22.4.043007
10.1186/s40064-016-3171-8
10.1109/TIFS.2014.2312817
10.1109/PlatCon.2016.7456799
10.1109/LSP.2006.870357
10.1109/TCSS.2016.2519463
10.1109/TIFS.2015.2434600
10.1109/LSP.2008.2008947
10.3390/s140203652
10.1109/LSP.2007.903255
10.1109/TIFS.2014.2326954
10.1016/j.sigpro.2015.10.023
10.1016/j.ins.2014.02.007
10.1371/journal.pone.0145800
10.1016/j.eswa.2009.09.050
10.3390/s140917112
10.1049/ip-vis:20059022
10.1109/TIFS.2014.2381872
10.1016/S0167-8655(00)00082-9
10.1016/S0167-4048(02)00515-1
10.1109/TIFS.2010.2041812
10.1016/j.compeleceng.2013.11.006
10.1109/TIFS.2007.916006
10.1007/s11042-006-0008-4
10.1016/j.ins.2014.12.042
10.1007/s10851-014-0511-6
10.1007/s11042-015-2671-9
10.1016/j.eswa.2014.04.022
10.1049/iet-ipr.2014.0351
10.1109/TIFS.2008.926097
10.1016/j.eswa.2012.02.106
10.1007/s10916-016-0473-x
10.1016/S0031-3203(02)00289-3
10.1016/S0031-3203(03)00221-8
10.1016/S0164-1212(03)00239-5
10.1016/S0031-3203(00)00015-7
10.1016/j.proeng.2012.07.259
10.1109/TCE.2004.1277880
10.1007/s11042-014-2381-8
10.1016/j.image.2012.10.002
10.1016/j.sigpro.2009.08.010
10.1007/s11071-013-1105-3
ContentType Journal Article
Copyright 2016 Elsevier B.V.
Copyright_xml – notice: 2016 Elsevier B.V.
DBID AAYXX
CITATION
DOI 10.1016/j.future.2016.11.029
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1872-7115
EndPage 960
ExternalDocumentID 10_1016_j_future_2016_11_029
S0167739X16306768
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
29H
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFNM
ABJNI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
AEBSH
AEKER
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BKOJK
BLXMC
CS3
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
G8K
GBLVA
GBOLZ
HLZ
HVGLF
HZ~
IHE
J1W
KOM
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
PC.
Q38
R2-
RIG
ROL
RPZ
SBC
SDF
SDG
SES
SEW
SPC
SPCBC
SSV
SSZ
T5K
UHS
WUQ
XPP
ZMT
~G-
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABDPE
ABWVN
ACLOT
ACRPL
ADNMO
AEIPS
AFJKZ
AGQPQ
AIIUN
ANKPU
APXCP
CITATION
EFKBS
~HD
ID FETCH-LOGICAL-c306t-b220feecd7a4fe95b75ca6362458eeb4585364c28a1e4e9bd9fc3effbca70efb3
ISICitedReferencesCount 55
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000437555800082&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0167-739X
IngestDate Sat Nov 29 07:22:30 EST 2025
Tue Nov 18 22:39:01 EST 2025
Fri Feb 23 02:35:14 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Security in social networking
Image steganography
Image and video processing
Information security
Uncorrelated color space
Online social networks
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c306t-b220feecd7a4fe95b75ca6362458eeb4585364c28a1e4e9bd9fc3effbca70efb3
PageCount 10
ParticipantIDs crossref_citationtrail_10_1016_j_future_2016_11_029
crossref_primary_10_1016_j_future_2016_11_029
elsevier_sciencedirect_doi_10_1016_j_future_2016_11_029
PublicationCentury 2000
PublicationDate September 2018
2018-09-00
PublicationDateYYYYMMDD 2018-09-01
PublicationDate_xml – month: 09
  year: 2018
  text: September 2018
PublicationDecade 2010
PublicationTitle Future generation computer systems
PublicationYear 2018
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Thien, Lin (br000150) 2003; 36
Yang, Lin, Gao, Lv, Wei, Song (br000220) 2015; 10
Bin, Shunquan, Ming, Jiwu (br000015) 2014; 9
Bin, Ming, Xiaolong, Shunquan, Jiwu (br000010) 2015; 10
Li, Li, Yang, Sun (br000035) 2015; 10
Qazanfari, Safabakhsh (br000050) 2014; 277
Wu, Wu, Tsai, Hwang (br000170) 2005; 152
Muhammad, Ahmad, Farman, Jan, Sajjad, Baik (br000135) 2015; 9
Bailey, Curran (br000185) 2006; 30
Liu, Zhang, Wang, Wang, Huang (br000030) 2015; 123
Parah, Sheikh, Hafiz, Bhat (br000095) 2014; 40
Hamza, Titouna (br000260) 2016
Zhang, Sun, Zhu, Fang (br000245) 2010; 24
Zheng, Chen-zi, Wei, Zi-long (br000255) 2016; 2
Wang, Lin, Lin (br000140) 2001; 34
Li, Yang, Cheng, Zeng (br000110) 2009; 16
Muhammad, Sajjad, Baik (br000225) 2016; 40
Yang, Weng, Wang, Sun (br000055) 2008; 3
Xia, Wang, Sun, Liu, Xiong (br000070) 2016; 75
Luo, Huang, Huang (br000175) 2010; 5
Isa, Noviyanto, Jatmiko, Arymurthy (br000285) 2012; 41
Mstafa, Elleithy (br000210) 2015
Mielikainen (br000065) 2006; 13
Anees, Siddiqui, Ahmed, Hussain (br000045) 2014; 75
Cayre, Bas (br000240) 2008; 3
Chen, Shu, Coatrieux, Chen, Sun, Coatrieux (br000265) 2015; 51
Zheng, Jeon, Xu, Wu, Zhang (br000270) 2015; 28
Sajjad, Mehmood, Baik (br000215) 2014; 14
Zhang, Zhang, Wang (br000060) 2007; 14
K. Muhammad, J. Ahmad, M. Sajjad, S. Rho, S.W. Baik, Evaluating the suitability of color spaces for image steganography and its application in wireless capsule endoscopy, in: 2016 International Conference on Platform Technology and Service (PlatCon), 2016, pp. 1-3.
Kanan, Nazeri (br000120) 2014; 41
Fakhredanesh, Rahmati, Safabakhsh (br000080) 2013; 22
Ejaz, Mehmood, Baik (br000235) 2013; 28
Cheng, Pedram (br000205) 2004; 50
Yan, Feng, Wang (br000250) 2015; 2
Muhammad, Ahmad, Farman, Zubair (br000190) 2014; 22
Khan, Siddiqa, Munib, Malik (br000040) 2014; 279
Sajjad, Muhammad, Baik, Rho, Jan, Yeo (br000100) 2016
Cheddad, Condell, Curran, Mc Kevitt (br000005) 2010; 90
Mazurczyk, Caviglione (br000025) 2014; 17
Linjie, Jiangqun, Yun Qing (br000020) 2014; 9
Lin, Tsai (br000160) 2004; 73
Laaksonen, Koskela, Laakso, Oja (br000200) 2000; 21
Chan, Cheng (br000165) 2004; 37
Ahani, Ghaemmaghami (br000085) 2015; 9
Mehmood, Sajjad, Baik (br000105) 2014; 14
Dumitrescu, Wu, Wang (br000180) 2003; 51
Muhammad, Ahmad, Sajjad, Baik (br000280) 2016; 5
Muhammad, Mehmood, Lee, Ji, Baik (br000275) 2015; 11
Ali, Ahn, Pant, Siarry (br000090) 2015; 301
Weiqi, Fangjun, Jiwu (br000115) 2010; 5
Muhammad, Sajjad, Mehmood, Rho, Baik (br000195) 2016; 75
Chen, Chang, Le (br000130) 2010; 37
Muhammad, Ahmad, Rehman, Jan, Sajjad (br000075) 2016
Lou, Liu (br000155) 2002; 21
Ioannidou, Halkidis, Stephanides (br000125) 2012; 39
Chang, Hsiao, Chan (br000145) 2003; 36
Zhang (10.1016/j.future.2016.11.029_br000245) 2010; 24
Ioannidou (10.1016/j.future.2016.11.029_br000125) 2012; 39
Li (10.1016/j.future.2016.11.029_br000035) 2015; 10
Ejaz (10.1016/j.future.2016.11.029_br000235) 2013; 28
Parah (10.1016/j.future.2016.11.029_br000095) 2014; 40
Chen (10.1016/j.future.2016.11.029_br000265) 2015; 51
Muhammad (10.1016/j.future.2016.11.029_br000190) 2014; 22
Yan (10.1016/j.future.2016.11.029_br000250) 2015; 2
Ali (10.1016/j.future.2016.11.029_br000090) 2015; 301
Bin (10.1016/j.future.2016.11.029_br000015) 2014; 9
Kanan (10.1016/j.future.2016.11.029_br000120) 2014; 41
Muhammad (10.1016/j.future.2016.11.029_br000135) 2015; 9
Lou (10.1016/j.future.2016.11.029_br000155) 2002; 21
Yang (10.1016/j.future.2016.11.029_br000220) 2015; 10
Thien (10.1016/j.future.2016.11.029_br000150) 2003; 36
Qazanfari (10.1016/j.future.2016.11.029_br000050) 2014; 277
Luo (10.1016/j.future.2016.11.029_br000175) 2010; 5
Cheddad (10.1016/j.future.2016.11.029_br000005) 2010; 90
Linjie (10.1016/j.future.2016.11.029_br000020) 2014; 9
Zhang (10.1016/j.future.2016.11.029_br000060) 2007; 14
Weiqi (10.1016/j.future.2016.11.029_br000115) 2010; 5
Muhammad (10.1016/j.future.2016.11.029_br000225) 2016; 40
Isa (10.1016/j.future.2016.11.029_br000285) 2012; 41
Ahani (10.1016/j.future.2016.11.029_br000085) 2015; 9
Fakhredanesh (10.1016/j.future.2016.11.029_br000080) 2013; 22
Wu (10.1016/j.future.2016.11.029_br000170) 2005; 152
Muhammad (10.1016/j.future.2016.11.029_br000280) 2016; 5
Chang (10.1016/j.future.2016.11.029_br000145) 2003; 36
Chen (10.1016/j.future.2016.11.029_br000130) 2010; 37
Mstafa (10.1016/j.future.2016.11.029_br000210) 2015
Xia (10.1016/j.future.2016.11.029_br000070) 2016; 75
Mehmood (10.1016/j.future.2016.11.029_br000105) 2014; 14
Mielikainen (10.1016/j.future.2016.11.029_br000065) 2006; 13
Muhammad (10.1016/j.future.2016.11.029_br000275) 2015; 11
Sajjad (10.1016/j.future.2016.11.029_br000100) 2016
Li (10.1016/j.future.2016.11.029_br000110) 2009; 16
Muhammad (10.1016/j.future.2016.11.029_br000075) 2016
Zheng (10.1016/j.future.2016.11.029_br000255) 2016; 2
Laaksonen (10.1016/j.future.2016.11.029_br000200) 2000; 21
Bin (10.1016/j.future.2016.11.029_br000010) 2015; 10
Lin (10.1016/j.future.2016.11.029_br000160) 2004; 73
Sajjad (10.1016/j.future.2016.11.029_br000215) 2014; 14
Dumitrescu (10.1016/j.future.2016.11.029_br000180) 2003; 51
Liu (10.1016/j.future.2016.11.029_br000030) 2015; 123
Bailey (10.1016/j.future.2016.11.029_br000185) 2006; 30
10.1016/j.future.2016.11.029_br000230
Muhammad (10.1016/j.future.2016.11.029_br000195) 2016; 75
Wang (10.1016/j.future.2016.11.029_br000140) 2001; 34
Hamza (10.1016/j.future.2016.11.029_br000260) 2016
Mazurczyk (10.1016/j.future.2016.11.029_br000025) 2014; 17
Khan (10.1016/j.future.2016.11.029_br000040) 2014; 279
Zheng (10.1016/j.future.2016.11.029_br000270) 2015; 28
Yang (10.1016/j.future.2016.11.029_br000055) 2008; 3
Anees (10.1016/j.future.2016.11.029_br000045) 2014; 75
Cayre (10.1016/j.future.2016.11.029_br000240) 2008; 3
Chan (10.1016/j.future.2016.11.029_br000165) 2004; 37
Cheng (10.1016/j.future.2016.11.029_br000205) 2004; 50
References_xml – volume: 9
  start-page: 1264
  year: 2014
  end-page: 1277
  ident: br000015
  article-title: Investigation on cost assignment in spatial image steganography
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 123
  start-page: 157
  year: 2015
  end-page: 166
  ident: br000030
  article-title: Authentication and recovery algorithm for speech signal based on digital watermarking
  publication-title: Signal Process.
– volume: 36
  start-page: 2875
  year: 2003
  end-page: 2881
  ident: br000150
  article-title: A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
  publication-title: Pattern Recognit.
– volume: 16
  start-page: 69
  year: 2009
  end-page: 72
  ident: br000110
  article-title: A generalization of LSB matching
  publication-title: IEEE Signal Process. Lett.
– volume: 11
  start-page: 87
  year: 2015
  end-page: 96
  ident: br000275
  article-title: Ontology-based secure retrieval of semantically significant visual contents
  publication-title: J. Korean Inst. Next Gener. Comput.
– volume: 2
  start-page: 30
  year: 2016
  end-page: 40
  ident: br000255
  article-title: Survey of trustworthy pervasive social networking
  publication-title: Chin, J. Netword Inf. Secur.
– volume: 5
  start-page: 1495
  year: 2016
  ident: br000280
  article-title: Visual saliency models for summarization of diagnostic hysteroscopy videos in healthcare systems
  publication-title: SpringerPlus
– volume: 277
  start-page: 90
  year: 2014
  end-page: 101
  ident: br000050
  article-title: A new steganography method which preserves histogram: Generalization of LSB
  publication-title: Inform. Sci.
– volume: 28
  start-page: 961
  year: 2015
  end-page: 973
  ident: br000270
  article-title: Image segmentation by generalized hierarchical fuzzy C-means algorithm
  publication-title: J. Intell. Fuzzy Systems
– volume: 75
  start-page: 14867
  year: 2016
  end-page: 14893
  ident: br000195
  article-title: A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image
  publication-title: Multimedia Tools Appl.
– volume: 14
  start-page: 17112
  year: 2014
  end-page: 17145
  ident: br000105
  article-title: Mobile-cloud assisted video summarization framework for efficient management of remote sensing data generated by wireless capsule sensors
  publication-title: Sensors
– volume: 75
  start-page: 1947
  year: 2016
  end-page: 1962
  ident: br000070
  article-title: Steganalysis of LSB matching using differences between nonadjacent pixels
  publication-title: Multimedia Tools Appl.
– volume: 3
  start-page: 1
  year: 2008
  end-page: 15
  ident: br000240
  article-title: Kerckhoffs-based embedding security classes for woa data hiding
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 22
  start-page: 647
  year: 2014
  end-page: 654
  ident: br000190
  article-title: A novel image steganographic approach for hiding text in color images using HSI color model
  publication-title: Middle-East J. Sci. Res.
– volume: 51
  start-page: 1995
  year: 2003
  end-page: 2007
  ident: br000180
  article-title: Detection of LSB steganography via sample pair analysis
  publication-title: IEEE Trans. Signal Process.
– volume: 28
  start-page: 34
  year: 2013
  end-page: 44
  ident: br000235
  article-title: Efficient visual attention based framework for extracting key frames from videos
  publication-title: Signal Process., Image Commun.
– volume: 9
  start-page: 814
  year: 2014
  end-page: 825
  ident: br000020
  article-title: Uniform embedding for efficient JPEG steganography
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 14
  start-page: 848
  year: 2007
  end-page: 851
  ident: br000060
  article-title: A double layered “plus-minus one” data embedding scheme
  publication-title: IEEE Signal Process. Lett.
– volume: 5
  start-page: 201
  year: 2010
  end-page: 214
  ident: br000175
  article-title: Edge adaptive image steganography based on LSB matching revisited
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 41
  start-page: 6123
  year: 2014
  end-page: 6130
  ident: br000120
  article-title: A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm
  publication-title: Expert Syst. Appl.
– volume: 9
  start-page: 1938
  year: 2015
  end-page: 1962
  ident: br000135
  article-title: A secure method for color image steganography using gray-level modification and multi-level encryption
  publication-title: KSII Trans. Internet Inf. Syst.
– start-page: 1
  year: 2015
  end-page: 23
  ident: br000210
  article-title: A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes
  publication-title: Multimedia Tools Appl.
– volume: 37
  start-page: 3292
  year: 2010
  end-page: 3301
  ident: br000130
  article-title: High payload steganography mechanism using hybrid edge detector
  publication-title: Expert Syst. Appl.
– volume: 17
  start-page: 334
  year: 2014
  end-page: 357
  ident: br000025
  article-title: Steganography in modern smartphones and mitigation techniques
  publication-title: IEEE Commun. Surv. Tutor.
– volume: 279
  start-page: 251
  year: 2014
  end-page: 272
  ident: br000040
  article-title: A recent survey of reversible watermarking techniques
  publication-title: Inform. Sci.
– volume: 36
  start-page: 1583
  year: 2003
  end-page: 1595
  ident: br000145
  article-title: Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy
  publication-title: Pattern Recognit.
– volume: 37
  start-page: 469
  year: 2004
  end-page: 474
  ident: br000165
  article-title: Hiding data in images by simple LSB substitution
  publication-title: Pattern Recognit.
– volume: 40
  start-page: 1
  year: 2016
  end-page: 16
  ident: br000225
  article-title: Dual-level security based cyclic18 steganographic method and its application for secure transmission of keyframes during wireless capsule endoscopy
  publication-title: J. Med. Syst.
– volume: 24
  start-page: 13
  year: 2010
  end-page: 18
  ident: br000245
  article-title: Privacy and security for online social networks: challenges and opportunities
  publication-title: IEEE Netw.
– volume: 5
  start-page: 201
  year: 2010
  end-page: 214
  ident: br000115
  article-title: Edge adaptive image steganography based on LSB matching revisited
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 21
  start-page: 449
  year: 2002
  end-page: 460
  ident: br000155
  article-title: Steganographic method for secure communications
  publication-title: Comput. Secur.
– start-page: 1
  year: 2016
  end-page: 30
  ident: br000075
  article-title: CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method
  publication-title: Multimedia Tools Appl.
– start-page: 1
  year: 2016
  end-page: 18
  ident: br000260
  article-title: A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map
  publication-title: Inf. Secur. J.
– volume: 39
  start-page: 11517
  year: 2012
  end-page: 11524
  ident: br000125
  article-title: A novel technique for image steganography based on a high payload method and edge detection
  publication-title: Expert Syst. Appl.
– volume: 73
  start-page: 405
  year: 2004
  end-page: 414
  ident: br000160
  article-title: Secret image sharing with steganography and authentication
  publication-title: J. Syst. Softw.
– volume: 13
  start-page: 285
  year: 2006
  end-page: 287
  ident: br000065
  article-title: LSB matching revisited
  publication-title: IEEE Signal Process. Lett.
– volume: 14
  start-page: 3652
  year: 2014
  end-page: 3674
  ident: br000215
  article-title: Sparse representations-based super-resolution of key-frames extracted from frames-sequences generated by a visual sensor network
  publication-title: Sensors
– volume: 2
  start-page: 88
  year: 2015
  end-page: 98
  ident: br000250
  article-title: Anonymous authentication for trustworthy pervasive social networking
  publication-title: IEEE Trans. Comput. Soc. Syst.
– volume: 3
  start-page: 488
  year: 2008
  end-page: 497
  ident: br000055
  article-title: Adaptive data hiding in edge areas of images with spatial LSB domain systems
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 75
  start-page: 807
  year: 2014
  end-page: 816
  ident: br000045
  article-title: A technique for digital steganography using chaotic maps
  publication-title: Nonlinear Dynam.
– volume: 90
  start-page: 727
  year: 2010
  end-page: 752
  ident: br000005
  article-title: Digital image steganography: Survey and analysis of current methods
  publication-title: Signal Process.
– volume: 10
  start-page: e0145800
  year: 2015
  ident: br000220
  article-title: Quality index for stereoscopic images by separately evaluating adding and subtracting
  publication-title: PloS One
– reference: K. Muhammad, J. Ahmad, M. Sajjad, S. Rho, S.W. Baik, Evaluating the suitability of color spaces for image steganography and its application in wireless capsule endoscopy, in: 2016 International Conference on Platform Technology and Service (PlatCon), 2016, pp. 1-3.
– volume: 40
  start-page: 70
  year: 2014
  end-page: 82
  ident: br000095
  article-title: Data hiding in scrambled images: a new double layer security data hiding technique
  publication-title: Comput. Electr. Eng.
– volume: 41
  start-page: 888
  year: 2012
  end-page: 896
  ident: br000285
  article-title: The effect of electrocardiogram signal compression using beat reordering and SPIHT on automatic sleep stage classification
  publication-title: Procedia Eng.
– volume: 21
  start-page: 1199
  year: 2000
  end-page: 1207
  ident: br000200
  article-title: PicSOM–content-based image retrieval with self-organizing maps
  publication-title: Pattern Recognit. Lett.
– volume: 301
  start-page: 44
  year: 2015
  end-page: 60
  ident: br000090
  article-title: An image watermarking scheme in wavelet domain with optimized compensation of singular value decomposition via artificial bee colony
  publication-title: Inform. Sci.
– volume: 9
  start-page: 496
  year: 2015
  end-page: 505
  ident: br000085
  article-title: Colour image steganography method based on sparse representation
  publication-title: IET Image Process.
– volume: 50
  start-page: 320
  year: 2004
  end-page: 328
  ident: br000205
  article-title: Chromatic encoding: a low power encoding technique for digital visual interface
  publication-title: IEEE Trans. Consum. Electron.
– volume: 51
  start-page: 124
  year: 2015
  end-page: 144
  ident: br000265
  article-title: Color image analysis by quaternion-type moments
  publication-title: J. Math. Imaging Vis.
– volume: 22
  year: 2013
  ident: br000080
  article-title: Adaptive image steganography using contourlet transform
  publication-title: J. Electron. Imaging
– start-page: 1
  year: 2016
  end-page: 18
  ident: br000100
  article-title: Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices
  publication-title: Multimedia Tools Appl.
– volume: 10
  start-page: 1905
  year: 2015
  end-page: 1917
  ident: br000010
  article-title: A strategy of clustering modification directions in spatial image steganography
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 10
  start-page: 507
  year: 2015
  end-page: 518
  ident: br000035
  article-title: Segmentation-based image copy-move forgery detection scheme
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 34
  start-page: 671
  year: 2001
  end-page: 683
  ident: br000140
  article-title: Image hiding by optimal LSB substitution and genetic algorithm
  publication-title: Pattern Recognit.
– volume: 152
  start-page: 611
  year: 2005
  end-page: 615
  ident: br000170
  article-title: Image steganographic scheme based on pixel-value differencing and LSB replacement methods
  publication-title: IEE Proc., Vis. Image Signal Process.
– volume: 30
  start-page: 55
  year: 2006
  end-page: 88
  ident: br000185
  article-title: An evaluation of image based steganography methods
  publication-title: Multimedia Tools Appl.
– volume: 24
  start-page: 13
  year: 2010
  ident: 10.1016/j.future.2016.11.029_br000245
  article-title: Privacy and security for online social networks: challenges and opportunities
  publication-title: IEEE Netw.
  doi: 10.1109/MNET.2010.5510913
– volume: 37
  start-page: 469
  year: 2004
  ident: 10.1016/j.future.2016.11.029_br000165
  article-title: Hiding data in images by simple LSB substitution
  publication-title: Pattern Recognit.
  doi: 10.1016/j.patcog.2003.08.007
– volume: 17
  start-page: 334
  year: 2014
  ident: 10.1016/j.future.2016.11.029_br000025
  article-title: Steganography in modern smartphones and mitigation techniques
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2014.2350994
– volume: 279
  start-page: 251
  year: 2014
  ident: 10.1016/j.future.2016.11.029_br000040
  article-title: A recent survey of reversible watermarking techniques
  publication-title: Inform. Sci.
  doi: 10.1016/j.ins.2014.03.118
– volume: 51
  start-page: 1995
  year: 2003
  ident: 10.1016/j.future.2016.11.029_br000180
  article-title: Detection of LSB steganography via sample pair analysis
  publication-title: IEEE Trans. Signal Process.
  doi: 10.1109/TSP.2003.812753
– volume: 22
  issue: 4
  year: 2013
  ident: 10.1016/j.future.2016.11.029_br000080
  article-title: Adaptive image steganography using contourlet transform
  publication-title: J. Electron. Imaging
  doi: 10.1117/1.JEI.22.4.043007
– volume: 5
  start-page: 1495
  year: 2016
  ident: 10.1016/j.future.2016.11.029_br000280
  article-title: Visual saliency models for summarization of diagnostic hysteroscopy videos in healthcare systems
  publication-title: SpringerPlus
  doi: 10.1186/s40064-016-3171-8
– volume: 9
  start-page: 814
  year: 2014
  ident: 10.1016/j.future.2016.11.029_br000020
  article-title: Uniform embedding for efficient JPEG steganography
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2014.2312817
– volume: 22
  start-page: 647
  year: 2014
  ident: 10.1016/j.future.2016.11.029_br000190
  article-title: A novel image steganographic approach for hiding text in color images using HSI color model
  publication-title: Middle-East J. Sci. Res.
– ident: 10.1016/j.future.2016.11.029_br000230
  doi: 10.1109/PlatCon.2016.7456799
– volume: 13
  start-page: 285
  year: 2006
  ident: 10.1016/j.future.2016.11.029_br000065
  article-title: LSB matching revisited
  publication-title: IEEE Signal Process. Lett.
  doi: 10.1109/LSP.2006.870357
– volume: 2
  start-page: 88
  year: 2015
  ident: 10.1016/j.future.2016.11.029_br000250
  article-title: Anonymous authentication for trustworthy pervasive social networking
  publication-title: IEEE Trans. Comput. Soc. Syst.
  doi: 10.1109/TCSS.2016.2519463
– start-page: 1
  year: 2016
  ident: 10.1016/j.future.2016.11.029_br000075
  article-title: CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method
  publication-title: Multimedia Tools Appl.
– volume: 10
  start-page: 1905
  year: 2015
  ident: 10.1016/j.future.2016.11.029_br000010
  article-title: A strategy of clustering modification directions in spatial image steganography
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2015.2434600
– volume: 16
  start-page: 69
  year: 2009
  ident: 10.1016/j.future.2016.11.029_br000110
  article-title: A generalization of LSB matching
  publication-title: IEEE Signal Process. Lett.
  doi: 10.1109/LSP.2008.2008947
– volume: 2
  start-page: 30
  year: 2016
  ident: 10.1016/j.future.2016.11.029_br000255
  article-title: Survey of trustworthy pervasive social networking
  publication-title: Chin, J. Netword Inf. Secur.
– volume: 14
  start-page: 3652
  year: 2014
  ident: 10.1016/j.future.2016.11.029_br000215
  article-title: Sparse representations-based super-resolution of key-frames extracted from frames-sequences generated by a visual sensor network
  publication-title: Sensors
  doi: 10.3390/s140203652
– volume: 14
  start-page: 848
  year: 2007
  ident: 10.1016/j.future.2016.11.029_br000060
  article-title: A double layered “plus-minus one” data embedding scheme
  publication-title: IEEE Signal Process. Lett.
  doi: 10.1109/LSP.2007.903255
– volume: 9
  start-page: 1264
  year: 2014
  ident: 10.1016/j.future.2016.11.029_br000015
  article-title: Investigation on cost assignment in spatial image steganography
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2014.2326954
– volume: 9
  start-page: 1938
  year: 2015
  ident: 10.1016/j.future.2016.11.029_br000135
  article-title: A secure method for color image steganography using gray-level modification and multi-level encryption
  publication-title: KSII Trans. Internet Inf. Syst.
– volume: 123
  start-page: 157
  year: 2015
  ident: 10.1016/j.future.2016.11.029_br000030
  article-title: Authentication and recovery algorithm for speech signal based on digital watermarking
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2015.10.023
– volume: 277
  start-page: 90
  year: 2014
  ident: 10.1016/j.future.2016.11.029_br000050
  article-title: A new steganography method which preserves histogram: Generalization of LSB〈sup〉++〈sup〉
  publication-title: Inform. Sci.
  doi: 10.1016/j.ins.2014.02.007
– volume: 10
  start-page: e0145800
  year: 2015
  ident: 10.1016/j.future.2016.11.029_br000220
  article-title: Quality index for stereoscopic images by separately evaluating adding and subtracting
  publication-title: PloS One
  doi: 10.1371/journal.pone.0145800
– volume: 37
  start-page: 3292
  year: 2010
  ident: 10.1016/j.future.2016.11.029_br000130
  article-title: High payload steganography mechanism using hybrid edge detector
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2009.09.050
– volume: 28
  start-page: 961
  year: 2015
  ident: 10.1016/j.future.2016.11.029_br000270
  article-title: Image segmentation by generalized hierarchical fuzzy C-means algorithm
  publication-title: J. Intell. Fuzzy Systems
– volume: 11
  start-page: 87
  year: 2015
  ident: 10.1016/j.future.2016.11.029_br000275
  article-title: Ontology-based secure retrieval of semantically significant visual contents
  publication-title: J. Korean Inst. Next Gener. Comput.
– volume: 14
  start-page: 17112
  year: 2014
  ident: 10.1016/j.future.2016.11.029_br000105
  article-title: Mobile-cloud assisted video summarization framework for efficient management of remote sensing data generated by wireless capsule sensors
  publication-title: Sensors
  doi: 10.3390/s140917112
– volume: 152
  start-page: 611
  year: 2005
  ident: 10.1016/j.future.2016.11.029_br000170
  article-title: Image steganographic scheme based on pixel-value differencing and LSB replacement methods
  publication-title: IEE Proc., Vis. Image Signal Process.
  doi: 10.1049/ip-vis:20059022
– volume: 10
  start-page: 507
  year: 2015
  ident: 10.1016/j.future.2016.11.029_br000035
  article-title: Segmentation-based image copy-move forgery detection scheme
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2014.2381872
– volume: 21
  start-page: 1199
  year: 2000
  ident: 10.1016/j.future.2016.11.029_br000200
  article-title: PicSOM–content-based image retrieval with self-organizing maps
  publication-title: Pattern Recognit. Lett.
  doi: 10.1016/S0167-8655(00)00082-9
– volume: 21
  start-page: 449
  year: 2002
  ident: 10.1016/j.future.2016.11.029_br000155
  article-title: Steganographic method for secure communications
  publication-title: Comput. Secur.
  doi: 10.1016/S0167-4048(02)00515-1
– volume: 5
  start-page: 201
  year: 2010
  ident: 10.1016/j.future.2016.11.029_br000175
  article-title: Edge adaptive image steganography based on LSB matching revisited
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2010.2041812
– volume: 40
  start-page: 70
  year: 2014
  ident: 10.1016/j.future.2016.11.029_br000095
  article-title: Data hiding in scrambled images: a new double layer security data hiding technique
  publication-title: Comput. Electr. Eng.
  doi: 10.1016/j.compeleceng.2013.11.006
– volume: 3
  start-page: 1
  year: 2008
  ident: 10.1016/j.future.2016.11.029_br000240
  article-title: Kerckhoffs-based embedding security classes for woa data hiding
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2007.916006
– volume: 5
  start-page: 201
  year: 2010
  ident: 10.1016/j.future.2016.11.029_br000115
  article-title: Edge adaptive image steganography based on LSB matching revisited
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2010.2041812
– volume: 30
  start-page: 55
  year: 2006
  ident: 10.1016/j.future.2016.11.029_br000185
  article-title: An evaluation of image based steganography methods
  publication-title: Multimedia Tools Appl.
  doi: 10.1007/s11042-006-0008-4
– volume: 301
  start-page: 44
  year: 2015
  ident: 10.1016/j.future.2016.11.029_br000090
  article-title: An image watermarking scheme in wavelet domain with optimized compensation of singular value decomposition via artificial bee colony
  publication-title: Inform. Sci.
  doi: 10.1016/j.ins.2014.12.042
– volume: 51
  start-page: 124
  year: 2015
  ident: 10.1016/j.future.2016.11.029_br000265
  article-title: Color image analysis by quaternion-type moments
  publication-title: J. Math. Imaging Vis.
  doi: 10.1007/s10851-014-0511-6
– volume: 75
  start-page: 14867
  year: 2016
  ident: 10.1016/j.future.2016.11.029_br000195
  article-title: A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image
  publication-title: Multimedia Tools Appl.
  doi: 10.1007/s11042-015-2671-9
– volume: 41
  start-page: 6123
  year: 2014
  ident: 10.1016/j.future.2016.11.029_br000120
  article-title: A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2014.04.022
– volume: 9
  start-page: 496
  year: 2015
  ident: 10.1016/j.future.2016.11.029_br000085
  article-title: Colour image steganography method based on sparse representation
  publication-title: IET Image Process.
  doi: 10.1049/iet-ipr.2014.0351
– volume: 3
  start-page: 488
  year: 2008
  ident: 10.1016/j.future.2016.11.029_br000055
  article-title: Adaptive data hiding in edge areas of images with spatial LSB domain systems
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2008.926097
– start-page: 1
  year: 2016
  ident: 10.1016/j.future.2016.11.029_br000100
  article-title: Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices
  publication-title: Multimedia Tools Appl.
– volume: 39
  start-page: 11517
  year: 2012
  ident: 10.1016/j.future.2016.11.029_br000125
  article-title: A novel technique for image steganography based on a high payload method and edge detection
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2012.02.106
– volume: 40
  start-page: 1
  year: 2016
  ident: 10.1016/j.future.2016.11.029_br000225
  article-title: Dual-level security based cyclic18 steganographic method and its application for secure transmission of keyframes during wireless capsule endoscopy
  publication-title: J. Med. Syst.
  doi: 10.1007/s10916-016-0473-x
– volume: 36
  start-page: 1583
  year: 2003
  ident: 10.1016/j.future.2016.11.029_br000145
  article-title: Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy
  publication-title: Pattern Recognit.
  doi: 10.1016/S0031-3203(02)00289-3
– volume: 36
  start-page: 2875
  year: 2003
  ident: 10.1016/j.future.2016.11.029_br000150
  article-title: A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
  publication-title: Pattern Recognit.
  doi: 10.1016/S0031-3203(03)00221-8
– volume: 73
  start-page: 405
  year: 2004
  ident: 10.1016/j.future.2016.11.029_br000160
  article-title: Secret image sharing with steganography and authentication
  publication-title: J. Syst. Softw.
  doi: 10.1016/S0164-1212(03)00239-5
– volume: 34
  start-page: 671
  year: 2001
  ident: 10.1016/j.future.2016.11.029_br000140
  article-title: Image hiding by optimal LSB substitution and genetic algorithm
  publication-title: Pattern Recognit.
  doi: 10.1016/S0031-3203(00)00015-7
– volume: 41
  start-page: 888
  year: 2012
  ident: 10.1016/j.future.2016.11.029_br000285
  article-title: The effect of electrocardiogram signal compression using beat reordering and SPIHT on automatic sleep stage classification
  publication-title: Procedia Eng.
  doi: 10.1016/j.proeng.2012.07.259
– volume: 50
  start-page: 320
  year: 2004
  ident: 10.1016/j.future.2016.11.029_br000205
  article-title: Chromatic encoding: a low power encoding technique for digital visual interface
  publication-title: IEEE Trans. Consum. Electron.
  doi: 10.1109/TCE.2004.1277880
– start-page: 1
  year: 2015
  ident: 10.1016/j.future.2016.11.029_br000210
  article-title: A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes
  publication-title: Multimedia Tools Appl.
– volume: 75
  start-page: 1947
  year: 2016
  ident: 10.1016/j.future.2016.11.029_br000070
  article-title: Steganalysis of LSB matching using differences between nonadjacent pixels
  publication-title: Multimedia Tools Appl.
  doi: 10.1007/s11042-014-2381-8
– volume: 28
  start-page: 34
  year: 2013
  ident: 10.1016/j.future.2016.11.029_br000235
  article-title: Efficient visual attention based framework for extracting key frames from videos
  publication-title: Signal Process., Image Commun.
  doi: 10.1016/j.image.2012.10.002
– volume: 90
  start-page: 727
  year: 2010
  ident: 10.1016/j.future.2016.11.029_br000005
  article-title: Digital image steganography: Survey and analysis of current methods
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2009.08.010
– volume: 75
  start-page: 807
  year: 2014
  ident: 10.1016/j.future.2016.11.029_br000045
  article-title: A technique for digital steganography using chaotic maps
  publication-title: Nonlinear Dynam.
  doi: 10.1007/s11071-013-1105-3
– start-page: 1
  year: 2016
  ident: 10.1016/j.future.2016.11.029_br000260
  article-title: A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map
  publication-title: Inf. Secur. J.
SSID ssj0001731
Score 2.4783905
Snippet Image steganography is a growing research field, where sensitive contents are embedded in images, keeping their visual quality intact. Researchers have used...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 951
SubjectTerms Image and video processing
Image steganography
Information security
Online social networks
Security in social networking
Uncorrelated color space
Title Image steganography using uncorrelated color space and its application for security of visual contents in online social networks
URI https://dx.doi.org/10.1016/j.future.2016.11.029
Volume 86
WOSCitedRecordID wos000437555800082&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1872-7115
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001731
  issn: 0167-739X
  databaseCode: AIEXJ
  dateStart: 19950201
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JbtswECVcp4deuhdJN_DQW6HAWkkegyJB3RZBUaeFbwJFkbWNSAm8Icd8Wj6tQ3JoK3DRDagPhCGLNqH3PByNZt4Q8gYsvpbGDCIp4yrKmFSRrIWKlC6SGhwUYVyF97dP7PSUj8fic693E2ph1uesbfnVlbj8r1DDMQDbls7-BdybL4UD8B5AhxFgh_GPgB82Ng0HwPsuW9SjfrtyEYGV1ax0xSva1rLZ3hpgT9T2AULnabZLP1xgczvrUa6ni5XTErE570uXRetVNkLYvfUJ5Yuuu3viFEtsm2aNTFPYRQIlpBdbwCeyaTzfPk62lB3J2cwfDWdsZuhJg_lCw7nZzvgycdHfkQYz1qCuOIY1Yr7J28JY2069jQ9_gllnqWu-C7uXN9mcwT1C7ItCg03nXaMsUNLW7-_C9y_Y2Tp8FGN26LVcbNJfcWj1XTEgc1uUe2RXYhcC7izs9wW_Q_YSlgveJ3tHw-Pxh403EDPsiYkrD-WbLsdw97d-7h51XJ6zh-Q-3qvQI8-xR6Sn28fkQegDQnFbeEKuHeXoLcpRRznapRx1lKOOchQoR4FytEM5auynSDl6YainHA2Uo9OWespRTzkaKPeUfD05Pnv3PsLOHpGCy7WMqiQZGK1VzWRmtMgrlitZgC-V5VzrCsY8LTKVcBnrTIuqFkal2phKSTbQpkqfkX570ep9QlU-qFiaiNhwlcFLZHWsiqxWUupacHlA0nBBS4Wy97b7ynkZ8htnpYehtDDAHXEJMByQaDPr0su-_OZ8FrAq0XX1LmkJ9PrlzOf_PPMFubf947wk_eV8pV-Ru2q9nC7mr5GHPwAcy8wr
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Image+steganography+using+uncorrelated+color+space+and+its+application+for+security+of+visual+contents+in+online+social+networks&rft.jtitle=Future+generation+computer+systems&rft.au=Muhammad%2C+Khan&rft.au=Sajjad%2C+Muhammad&rft.au=Mehmood%2C+Irfan&rft.au=Rho%2C+Seungmin&rft.date=2018-09-01&rft.pub=Elsevier+B.V&rft.issn=0167-739X&rft.eissn=1872-7115&rft.volume=86&rft.spage=951&rft.epage=960&rft_id=info:doi/10.1016%2Fj.future.2016.11.029&rft.externalDocID=S0167739X16306768
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-739X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-739X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-739X&client=summon