Image steganography using uncorrelated color space and its application for security of visual contents in online social networks
Image steganography is a growing research field, where sensitive contents are embedded in images, keeping their visual quality intact. Researchers have used correlated color space such as RGB, where modification to one channel affects the overall quality of stego-images, hence decreasing its suitabi...
Gespeichert in:
| Veröffentlicht in: | Future generation computer systems Jg. 86; S. 951 - 960 |
|---|---|
| Hauptverfasser: | , , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Elsevier B.V
01.09.2018
|
| Schlagworte: | |
| ISSN: | 0167-739X, 1872-7115 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Image steganography is a growing research field, where sensitive contents are embedded in images, keeping their visual quality intact. Researchers have used correlated color space such as RGB, where modification to one channel affects the overall quality of stego-images, hence decreasing its suitability for steganographic algorithms. Therefore, in this paper, we propose an adaptive LSB substitution method using uncorrelated color space, increasing the property of imperceptibility while minimizing the chances of detection by the human vision system. In the proposed scheme, the input image is passed through an image scrambler, resulting in an encrypted image, preserving the privacy of image contents, and then converted to HSV color space for further processing. The secret contents are encrypted using an iterative magic matrix encryption algorithm (IMMEA) for better security, producing the cipher contents. An adaptive LSB substitution method is then used to embed the encrypted data inside the V-plane of HSV color model based on secret key-directed block magic LSB mechanism. The idea of utilizing HSV color space for data hiding is inspired from its properties including de-correlation, cost-effectiveness in processing, better stego image quality, and suitability for steganography as verified by our experiments, compared to other color spaces such as RGB, YCbCr, HSI, and Lab. The quantitative and qualitative experimental results of the proposed framework and its application for addressing the security and privacy of visual contents in online social networks (OSNs), confirm its effectiveness in contrast to state-of-the-art methods.
•A secure framework for ensuring the security of visual contents in online social networks.•Image scrambling using a light-weighted image scrambler before data embedding.•Encryption of sensitive contents using iterative magic matrix-based encryption algorithm.•Data hiding using an adaptive LSB substitution method. |
|---|---|
| AbstractList | Image steganography is a growing research field, where sensitive contents are embedded in images, keeping their visual quality intact. Researchers have used correlated color space such as RGB, where modification to one channel affects the overall quality of stego-images, hence decreasing its suitability for steganographic algorithms. Therefore, in this paper, we propose an adaptive LSB substitution method using uncorrelated color space, increasing the property of imperceptibility while minimizing the chances of detection by the human vision system. In the proposed scheme, the input image is passed through an image scrambler, resulting in an encrypted image, preserving the privacy of image contents, and then converted to HSV color space for further processing. The secret contents are encrypted using an iterative magic matrix encryption algorithm (IMMEA) for better security, producing the cipher contents. An adaptive LSB substitution method is then used to embed the encrypted data inside the V-plane of HSV color model based on secret key-directed block magic LSB mechanism. The idea of utilizing HSV color space for data hiding is inspired from its properties including de-correlation, cost-effectiveness in processing, better stego image quality, and suitability for steganography as verified by our experiments, compared to other color spaces such as RGB, YCbCr, HSI, and Lab. The quantitative and qualitative experimental results of the proposed framework and its application for addressing the security and privacy of visual contents in online social networks (OSNs), confirm its effectiveness in contrast to state-of-the-art methods.
•A secure framework for ensuring the security of visual contents in online social networks.•Image scrambling using a light-weighted image scrambler before data embedding.•Encryption of sensitive contents using iterative magic matrix-based encryption algorithm.•Data hiding using an adaptive LSB substitution method. |
| Author | Mehmood, Irfan Sajjad, Muhammad Rho, Seungmin Muhammad, Khan Baik, Sung Wook |
| Author_xml | – sequence: 1 givenname: Khan surname: Muhammad fullname: Muhammad, Khan email: khan.muhammad.icp@gmail.com, khanmuhammad@sju.ac.kr organization: Intelligent Media Laboratory, Digital Contents Research Institute, College of Electronics and Information Engineering, Sejong University, Seoul, Republic of Korea – sequence: 2 givenname: Muhammad surname: Sajjad fullname: Sajjad, Muhammad email: muhammad.sajjad@icp.edu.pk organization: Digital Image Processing Laboratory, Department of Computer Science, Islamia College Peshawar, Pakistan – sequence: 3 givenname: Irfan surname: Mehmood fullname: Mehmood, Irfan email: irfan@sejong.ac.kr organization: Department of Computer Science and Engineering, Sejong University, Seoul, Republic of Korea – sequence: 4 givenname: Seungmin surname: Rho fullname: Rho, Seungmin email: smrho@sungkyul.edu organization: Department of Media Software, Sungkyul University, Anyang, Republic of Korea – sequence: 5 givenname: Sung Wook surname: Baik fullname: Baik, Sung Wook email: sbaik@sejong.ac.kr organization: Intelligent Media Laboratory, Digital Contents Research Institute, College of Electronics and Information Engineering, Sejong University, Seoul, Republic of Korea |
| BookMark | eNqFkE1LAzEQhoNUsFX_gYf8gV2T_ex6EKT4BQUvCt5CdnZSU7fJkmQrvfnTTa0nD3qZYXjnmY93RibGGiTkgrOUM15drlM1htFhmsUq5TxlWXNEpnxeZ0nNeTkh0yjUSZ03rydk5v2aMcbrnE_J5-NGrpD6gCtp7MrJ4W1HR6_Nio4GrHPYy4AdBdtbR_0gAak0HdXBUzkMvQYZtDVU7VWE0emwo1bRrfaj7CNmAprYqw21ptcmrrKgo2IwfFj37s_IsZK9x_OffEpe7m6fFw_J8un-cXGzTCBnVUjaLGMKEbpaFgqbsq1LkFVeZUU5R2xjLPOqgGwuORbYtF2jIEelWpA1Q9Xmp-TqMBec9d6hEqDD9-3BSd0LzsTeS7EWBy_F3kvBuYheRrj4BQ9Ob6Tb_YddHzCMj201OuFBowHstEMIorP67wFfYXaYnw |
| CitedBy_id | crossref_primary_10_1080_1206212X_2019_1692442 crossref_primary_10_3390_sym14010111 crossref_primary_10_1016_j_ijinfomgt_2018_08_011 crossref_primary_10_1109_ACCESS_2018_2799240 crossref_primary_10_1007_s11042_023_16240_w crossref_primary_10_1016_j_sigpro_2022_108908 crossref_primary_10_1007_s11042_021_10723_4 crossref_primary_10_1111_exsy_13375 crossref_primary_10_1080_00051144_2019_1624409 crossref_primary_10_1117_1_JEI_32_4_043002 crossref_primary_10_1007_s11042_020_10224_w crossref_primary_10_1007_s11042_022_13581_w crossref_primary_10_1109_JIOT_2019_2896120 crossref_primary_10_1007_s00530_020_00665_6 crossref_primary_10_1109_TII_2018_2791944 crossref_primary_10_1016_j_cose_2022_102784 crossref_primary_10_1016_j_neucom_2017_04_083 crossref_primary_10_1007_s11042_019_7731_0 crossref_primary_10_1016_j_ins_2019_03_032 crossref_primary_10_1016_j_future_2018_05_017 crossref_primary_10_1007_s11227_018_2641_x crossref_primary_10_1007_s12553_021_00602_1 crossref_primary_10_1007_s11042_019_7342_9 crossref_primary_10_1016_j_future_2019_01_047 crossref_primary_10_1007_s11277_018_5868_1 crossref_primary_10_1007_s11042_019_08304_7 crossref_primary_10_1007_s11042_023_15177_4 crossref_primary_10_1007_s11042_017_4420_8 crossref_primary_10_1016_j_jisa_2017_06_005 crossref_primary_10_1109_ACCESS_2017_2780822 crossref_primary_10_1109_TCSVT_2019_2896270 crossref_primary_10_1049_cit2_12053 crossref_primary_10_3233_JIFS_179549 crossref_primary_10_1007_s00500_021_05601_y crossref_primary_10_4018_IJEHMC_2019100102 crossref_primary_10_1109_ACCESS_2018_2808172 crossref_primary_10_1016_j_comcom_2018_06_001 crossref_primary_10_1109_ACCESS_2018_2834916 crossref_primary_10_1007_s11042_019_7628_y crossref_primary_10_1007_s11042_017_5590_0 crossref_primary_10_1007_s11042_019_07930_5 crossref_primary_10_3390_s20113108 crossref_primary_10_1049_ipr2_13177 crossref_primary_10_1109_ACCESS_2020_2966889 crossref_primary_10_1016_j_jer_2025_07_008 crossref_primary_10_1007_s00779_021_01630_4 crossref_primary_10_1016_j_ins_2019_01_070 crossref_primary_10_1155_2021_6610678 crossref_primary_10_1007_s11042_022_12273_9 crossref_primary_10_1007_s13369_019_04272_0 crossref_primary_10_1007_s11042_019_7519_2 crossref_primary_10_1155_2021_6351144 |
| Cites_doi | 10.1109/MNET.2010.5510913 10.1016/j.patcog.2003.08.007 10.1109/COMST.2014.2350994 10.1016/j.ins.2014.03.118 10.1109/TSP.2003.812753 10.1117/1.JEI.22.4.043007 10.1186/s40064-016-3171-8 10.1109/TIFS.2014.2312817 10.1109/PlatCon.2016.7456799 10.1109/LSP.2006.870357 10.1109/TCSS.2016.2519463 10.1109/TIFS.2015.2434600 10.1109/LSP.2008.2008947 10.3390/s140203652 10.1109/LSP.2007.903255 10.1109/TIFS.2014.2326954 10.1016/j.sigpro.2015.10.023 10.1016/j.ins.2014.02.007 10.1371/journal.pone.0145800 10.1016/j.eswa.2009.09.050 10.3390/s140917112 10.1049/ip-vis:20059022 10.1109/TIFS.2014.2381872 10.1016/S0167-8655(00)00082-9 10.1016/S0167-4048(02)00515-1 10.1109/TIFS.2010.2041812 10.1016/j.compeleceng.2013.11.006 10.1109/TIFS.2007.916006 10.1007/s11042-006-0008-4 10.1016/j.ins.2014.12.042 10.1007/s10851-014-0511-6 10.1007/s11042-015-2671-9 10.1016/j.eswa.2014.04.022 10.1049/iet-ipr.2014.0351 10.1109/TIFS.2008.926097 10.1016/j.eswa.2012.02.106 10.1007/s10916-016-0473-x 10.1016/S0031-3203(02)00289-3 10.1016/S0031-3203(03)00221-8 10.1016/S0164-1212(03)00239-5 10.1016/S0031-3203(00)00015-7 10.1016/j.proeng.2012.07.259 10.1109/TCE.2004.1277880 10.1007/s11042-014-2381-8 10.1016/j.image.2012.10.002 10.1016/j.sigpro.2009.08.010 10.1007/s11071-013-1105-3 |
| ContentType | Journal Article |
| Copyright | 2016 Elsevier B.V. |
| Copyright_xml | – notice: 2016 Elsevier B.V. |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.future.2016.11.029 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1872-7115 |
| EndPage | 960 |
| ExternalDocumentID | 10_1016_j_future_2016_11_029 S0167739X16306768 |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 29H 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFNM ABJNI ABMAC ABXDB ABYKQ ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD AEBSH AEKER AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BLXMC CS3 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q G8K GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W KOM LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 PC. Q38 R2- RIG ROL RPZ SBC SDF SDG SES SEW SPC SPCBC SSV SSZ T5K UHS WUQ XPP ZMT ~G- 9DU AATTM AAXKI AAYWO AAYXX ABDPE ABWVN ACLOT ACRPL ADNMO AEIPS AFJKZ AGQPQ AIIUN ANKPU APXCP CITATION EFKBS ~HD |
| ID | FETCH-LOGICAL-c306t-b220feecd7a4fe95b75ca6362458eeb4585364c28a1e4e9bd9fc3effbca70efb3 |
| ISICitedReferencesCount | 55 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000437555800082&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0167-739X |
| IngestDate | Sat Nov 29 07:22:30 EST 2025 Tue Nov 18 22:39:01 EST 2025 Fri Feb 23 02:35:14 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Security in social networking Image steganography Image and video processing Information security Uncorrelated color space Online social networks |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c306t-b220feecd7a4fe95b75ca6362458eeb4585364c28a1e4e9bd9fc3effbca70efb3 |
| PageCount | 10 |
| ParticipantIDs | crossref_citationtrail_10_1016_j_future_2016_11_029 crossref_primary_10_1016_j_future_2016_11_029 elsevier_sciencedirect_doi_10_1016_j_future_2016_11_029 |
| PublicationCentury | 2000 |
| PublicationDate | September 2018 2018-09-00 |
| PublicationDateYYYYMMDD | 2018-09-01 |
| PublicationDate_xml | – month: 09 year: 2018 text: September 2018 |
| PublicationDecade | 2010 |
| PublicationTitle | Future generation computer systems |
| PublicationYear | 2018 |
| Publisher | Elsevier B.V |
| Publisher_xml | – name: Elsevier B.V |
| References | Thien, Lin (br000150) 2003; 36 Yang, Lin, Gao, Lv, Wei, Song (br000220) 2015; 10 Bin, Shunquan, Ming, Jiwu (br000015) 2014; 9 Bin, Ming, Xiaolong, Shunquan, Jiwu (br000010) 2015; 10 Li, Li, Yang, Sun (br000035) 2015; 10 Qazanfari, Safabakhsh (br000050) 2014; 277 Wu, Wu, Tsai, Hwang (br000170) 2005; 152 Muhammad, Ahmad, Farman, Jan, Sajjad, Baik (br000135) 2015; 9 Bailey, Curran (br000185) 2006; 30 Liu, Zhang, Wang, Wang, Huang (br000030) 2015; 123 Parah, Sheikh, Hafiz, Bhat (br000095) 2014; 40 Hamza, Titouna (br000260) 2016 Zhang, Sun, Zhu, Fang (br000245) 2010; 24 Zheng, Chen-zi, Wei, Zi-long (br000255) 2016; 2 Wang, Lin, Lin (br000140) 2001; 34 Li, Yang, Cheng, Zeng (br000110) 2009; 16 Muhammad, Sajjad, Baik (br000225) 2016; 40 Yang, Weng, Wang, Sun (br000055) 2008; 3 Xia, Wang, Sun, Liu, Xiong (br000070) 2016; 75 Luo, Huang, Huang (br000175) 2010; 5 Isa, Noviyanto, Jatmiko, Arymurthy (br000285) 2012; 41 Mstafa, Elleithy (br000210) 2015 Mielikainen (br000065) 2006; 13 Anees, Siddiqui, Ahmed, Hussain (br000045) 2014; 75 Cayre, Bas (br000240) 2008; 3 Chen, Shu, Coatrieux, Chen, Sun, Coatrieux (br000265) 2015; 51 Zheng, Jeon, Xu, Wu, Zhang (br000270) 2015; 28 Sajjad, Mehmood, Baik (br000215) 2014; 14 Zhang, Zhang, Wang (br000060) 2007; 14 K. Muhammad, J. Ahmad, M. Sajjad, S. Rho, S.W. Baik, Evaluating the suitability of color spaces for image steganography and its application in wireless capsule endoscopy, in: 2016 International Conference on Platform Technology and Service (PlatCon), 2016, pp. 1-3. Kanan, Nazeri (br000120) 2014; 41 Fakhredanesh, Rahmati, Safabakhsh (br000080) 2013; 22 Ejaz, Mehmood, Baik (br000235) 2013; 28 Cheng, Pedram (br000205) 2004; 50 Yan, Feng, Wang (br000250) 2015; 2 Muhammad, Ahmad, Farman, Zubair (br000190) 2014; 22 Khan, Siddiqa, Munib, Malik (br000040) 2014; 279 Sajjad, Muhammad, Baik, Rho, Jan, Yeo (br000100) 2016 Cheddad, Condell, Curran, Mc Kevitt (br000005) 2010; 90 Mazurczyk, Caviglione (br000025) 2014; 17 Linjie, Jiangqun, Yun Qing (br000020) 2014; 9 Lin, Tsai (br000160) 2004; 73 Laaksonen, Koskela, Laakso, Oja (br000200) 2000; 21 Chan, Cheng (br000165) 2004; 37 Ahani, Ghaemmaghami (br000085) 2015; 9 Mehmood, Sajjad, Baik (br000105) 2014; 14 Dumitrescu, Wu, Wang (br000180) 2003; 51 Muhammad, Ahmad, Sajjad, Baik (br000280) 2016; 5 Muhammad, Mehmood, Lee, Ji, Baik (br000275) 2015; 11 Ali, Ahn, Pant, Siarry (br000090) 2015; 301 Weiqi, Fangjun, Jiwu (br000115) 2010; 5 Muhammad, Sajjad, Mehmood, Rho, Baik (br000195) 2016; 75 Chen, Chang, Le (br000130) 2010; 37 Muhammad, Ahmad, Rehman, Jan, Sajjad (br000075) 2016 Lou, Liu (br000155) 2002; 21 Ioannidou, Halkidis, Stephanides (br000125) 2012; 39 Chang, Hsiao, Chan (br000145) 2003; 36 Zhang (10.1016/j.future.2016.11.029_br000245) 2010; 24 Ioannidou (10.1016/j.future.2016.11.029_br000125) 2012; 39 Li (10.1016/j.future.2016.11.029_br000035) 2015; 10 Ejaz (10.1016/j.future.2016.11.029_br000235) 2013; 28 Parah (10.1016/j.future.2016.11.029_br000095) 2014; 40 Chen (10.1016/j.future.2016.11.029_br000265) 2015; 51 Muhammad (10.1016/j.future.2016.11.029_br000190) 2014; 22 Yan (10.1016/j.future.2016.11.029_br000250) 2015; 2 Ali (10.1016/j.future.2016.11.029_br000090) 2015; 301 Bin (10.1016/j.future.2016.11.029_br000015) 2014; 9 Kanan (10.1016/j.future.2016.11.029_br000120) 2014; 41 Muhammad (10.1016/j.future.2016.11.029_br000135) 2015; 9 Lou (10.1016/j.future.2016.11.029_br000155) 2002; 21 Yang (10.1016/j.future.2016.11.029_br000220) 2015; 10 Thien (10.1016/j.future.2016.11.029_br000150) 2003; 36 Qazanfari (10.1016/j.future.2016.11.029_br000050) 2014; 277 Luo (10.1016/j.future.2016.11.029_br000175) 2010; 5 Cheddad (10.1016/j.future.2016.11.029_br000005) 2010; 90 Linjie (10.1016/j.future.2016.11.029_br000020) 2014; 9 Zhang (10.1016/j.future.2016.11.029_br000060) 2007; 14 Weiqi (10.1016/j.future.2016.11.029_br000115) 2010; 5 Muhammad (10.1016/j.future.2016.11.029_br000225) 2016; 40 Isa (10.1016/j.future.2016.11.029_br000285) 2012; 41 Ahani (10.1016/j.future.2016.11.029_br000085) 2015; 9 Fakhredanesh (10.1016/j.future.2016.11.029_br000080) 2013; 22 Wu (10.1016/j.future.2016.11.029_br000170) 2005; 152 Muhammad (10.1016/j.future.2016.11.029_br000280) 2016; 5 Chang (10.1016/j.future.2016.11.029_br000145) 2003; 36 Chen (10.1016/j.future.2016.11.029_br000130) 2010; 37 Mstafa (10.1016/j.future.2016.11.029_br000210) 2015 Xia (10.1016/j.future.2016.11.029_br000070) 2016; 75 Mehmood (10.1016/j.future.2016.11.029_br000105) 2014; 14 Mielikainen (10.1016/j.future.2016.11.029_br000065) 2006; 13 Muhammad (10.1016/j.future.2016.11.029_br000275) 2015; 11 Sajjad (10.1016/j.future.2016.11.029_br000100) 2016 Li (10.1016/j.future.2016.11.029_br000110) 2009; 16 Muhammad (10.1016/j.future.2016.11.029_br000075) 2016 Zheng (10.1016/j.future.2016.11.029_br000255) 2016; 2 Laaksonen (10.1016/j.future.2016.11.029_br000200) 2000; 21 Bin (10.1016/j.future.2016.11.029_br000010) 2015; 10 Lin (10.1016/j.future.2016.11.029_br000160) 2004; 73 Sajjad (10.1016/j.future.2016.11.029_br000215) 2014; 14 Dumitrescu (10.1016/j.future.2016.11.029_br000180) 2003; 51 Liu (10.1016/j.future.2016.11.029_br000030) 2015; 123 Bailey (10.1016/j.future.2016.11.029_br000185) 2006; 30 10.1016/j.future.2016.11.029_br000230 Muhammad (10.1016/j.future.2016.11.029_br000195) 2016; 75 Wang (10.1016/j.future.2016.11.029_br000140) 2001; 34 Hamza (10.1016/j.future.2016.11.029_br000260) 2016 Mazurczyk (10.1016/j.future.2016.11.029_br000025) 2014; 17 Khan (10.1016/j.future.2016.11.029_br000040) 2014; 279 Zheng (10.1016/j.future.2016.11.029_br000270) 2015; 28 Yang (10.1016/j.future.2016.11.029_br000055) 2008; 3 Anees (10.1016/j.future.2016.11.029_br000045) 2014; 75 Cayre (10.1016/j.future.2016.11.029_br000240) 2008; 3 Chan (10.1016/j.future.2016.11.029_br000165) 2004; 37 Cheng (10.1016/j.future.2016.11.029_br000205) 2004; 50 |
| References_xml | – volume: 9 start-page: 1264 year: 2014 end-page: 1277 ident: br000015 article-title: Investigation on cost assignment in spatial image steganography publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 123 start-page: 157 year: 2015 end-page: 166 ident: br000030 article-title: Authentication and recovery algorithm for speech signal based on digital watermarking publication-title: Signal Process. – volume: 36 start-page: 2875 year: 2003 end-page: 2881 ident: br000150 article-title: A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function publication-title: Pattern Recognit. – volume: 16 start-page: 69 year: 2009 end-page: 72 ident: br000110 article-title: A generalization of LSB matching publication-title: IEEE Signal Process. Lett. – volume: 11 start-page: 87 year: 2015 end-page: 96 ident: br000275 article-title: Ontology-based secure retrieval of semantically significant visual contents publication-title: J. Korean Inst. Next Gener. Comput. – volume: 2 start-page: 30 year: 2016 end-page: 40 ident: br000255 article-title: Survey of trustworthy pervasive social networking publication-title: Chin, J. Netword Inf. Secur. – volume: 5 start-page: 1495 year: 2016 ident: br000280 article-title: Visual saliency models for summarization of diagnostic hysteroscopy videos in healthcare systems publication-title: SpringerPlus – volume: 277 start-page: 90 year: 2014 end-page: 101 ident: br000050 article-title: A new steganography method which preserves histogram: Generalization of LSB publication-title: Inform. Sci. – volume: 28 start-page: 961 year: 2015 end-page: 973 ident: br000270 article-title: Image segmentation by generalized hierarchical fuzzy C-means algorithm publication-title: J. Intell. Fuzzy Systems – volume: 75 start-page: 14867 year: 2016 end-page: 14893 ident: br000195 article-title: A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image publication-title: Multimedia Tools Appl. – volume: 14 start-page: 17112 year: 2014 end-page: 17145 ident: br000105 article-title: Mobile-cloud assisted video summarization framework for efficient management of remote sensing data generated by wireless capsule sensors publication-title: Sensors – volume: 75 start-page: 1947 year: 2016 end-page: 1962 ident: br000070 article-title: Steganalysis of LSB matching using differences between nonadjacent pixels publication-title: Multimedia Tools Appl. – volume: 3 start-page: 1 year: 2008 end-page: 15 ident: br000240 article-title: Kerckhoffs-based embedding security classes for woa data hiding publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 22 start-page: 647 year: 2014 end-page: 654 ident: br000190 article-title: A novel image steganographic approach for hiding text in color images using HSI color model publication-title: Middle-East J. Sci. Res. – volume: 51 start-page: 1995 year: 2003 end-page: 2007 ident: br000180 article-title: Detection of LSB steganography via sample pair analysis publication-title: IEEE Trans. Signal Process. – volume: 28 start-page: 34 year: 2013 end-page: 44 ident: br000235 article-title: Efficient visual attention based framework for extracting key frames from videos publication-title: Signal Process., Image Commun. – volume: 9 start-page: 814 year: 2014 end-page: 825 ident: br000020 article-title: Uniform embedding for efficient JPEG steganography publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 14 start-page: 848 year: 2007 end-page: 851 ident: br000060 article-title: A double layered “plus-minus one” data embedding scheme publication-title: IEEE Signal Process. Lett. – volume: 5 start-page: 201 year: 2010 end-page: 214 ident: br000175 article-title: Edge adaptive image steganography based on LSB matching revisited publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 41 start-page: 6123 year: 2014 end-page: 6130 ident: br000120 article-title: A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm publication-title: Expert Syst. Appl. – volume: 9 start-page: 1938 year: 2015 end-page: 1962 ident: br000135 article-title: A secure method for color image steganography using gray-level modification and multi-level encryption publication-title: KSII Trans. Internet Inf. Syst. – start-page: 1 year: 2015 end-page: 23 ident: br000210 article-title: A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes publication-title: Multimedia Tools Appl. – volume: 37 start-page: 3292 year: 2010 end-page: 3301 ident: br000130 article-title: High payload steganography mechanism using hybrid edge detector publication-title: Expert Syst. Appl. – volume: 17 start-page: 334 year: 2014 end-page: 357 ident: br000025 article-title: Steganography in modern smartphones and mitigation techniques publication-title: IEEE Commun. Surv. Tutor. – volume: 279 start-page: 251 year: 2014 end-page: 272 ident: br000040 article-title: A recent survey of reversible watermarking techniques publication-title: Inform. Sci. – volume: 36 start-page: 1583 year: 2003 end-page: 1595 ident: br000145 article-title: Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy publication-title: Pattern Recognit. – volume: 37 start-page: 469 year: 2004 end-page: 474 ident: br000165 article-title: Hiding data in images by simple LSB substitution publication-title: Pattern Recognit. – volume: 40 start-page: 1 year: 2016 end-page: 16 ident: br000225 article-title: Dual-level security based cyclic18 steganographic method and its application for secure transmission of keyframes during wireless capsule endoscopy publication-title: J. Med. Syst. – volume: 24 start-page: 13 year: 2010 end-page: 18 ident: br000245 article-title: Privacy and security for online social networks: challenges and opportunities publication-title: IEEE Netw. – volume: 5 start-page: 201 year: 2010 end-page: 214 ident: br000115 article-title: Edge adaptive image steganography based on LSB matching revisited publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 21 start-page: 449 year: 2002 end-page: 460 ident: br000155 article-title: Steganographic method for secure communications publication-title: Comput. Secur. – start-page: 1 year: 2016 end-page: 30 ident: br000075 article-title: CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method publication-title: Multimedia Tools Appl. – start-page: 1 year: 2016 end-page: 18 ident: br000260 article-title: A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map publication-title: Inf. Secur. J. – volume: 39 start-page: 11517 year: 2012 end-page: 11524 ident: br000125 article-title: A novel technique for image steganography based on a high payload method and edge detection publication-title: Expert Syst. Appl. – volume: 73 start-page: 405 year: 2004 end-page: 414 ident: br000160 article-title: Secret image sharing with steganography and authentication publication-title: J. Syst. Softw. – volume: 13 start-page: 285 year: 2006 end-page: 287 ident: br000065 article-title: LSB matching revisited publication-title: IEEE Signal Process. Lett. – volume: 14 start-page: 3652 year: 2014 end-page: 3674 ident: br000215 article-title: Sparse representations-based super-resolution of key-frames extracted from frames-sequences generated by a visual sensor network publication-title: Sensors – volume: 2 start-page: 88 year: 2015 end-page: 98 ident: br000250 article-title: Anonymous authentication for trustworthy pervasive social networking publication-title: IEEE Trans. Comput. Soc. Syst. – volume: 3 start-page: 488 year: 2008 end-page: 497 ident: br000055 article-title: Adaptive data hiding in edge areas of images with spatial LSB domain systems publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 75 start-page: 807 year: 2014 end-page: 816 ident: br000045 article-title: A technique for digital steganography using chaotic maps publication-title: Nonlinear Dynam. – volume: 90 start-page: 727 year: 2010 end-page: 752 ident: br000005 article-title: Digital image steganography: Survey and analysis of current methods publication-title: Signal Process. – volume: 10 start-page: e0145800 year: 2015 ident: br000220 article-title: Quality index for stereoscopic images by separately evaluating adding and subtracting publication-title: PloS One – reference: K. Muhammad, J. Ahmad, M. Sajjad, S. Rho, S.W. Baik, Evaluating the suitability of color spaces for image steganography and its application in wireless capsule endoscopy, in: 2016 International Conference on Platform Technology and Service (PlatCon), 2016, pp. 1-3. – volume: 40 start-page: 70 year: 2014 end-page: 82 ident: br000095 article-title: Data hiding in scrambled images: a new double layer security data hiding technique publication-title: Comput. Electr. Eng. – volume: 41 start-page: 888 year: 2012 end-page: 896 ident: br000285 article-title: The effect of electrocardiogram signal compression using beat reordering and SPIHT on automatic sleep stage classification publication-title: Procedia Eng. – volume: 21 start-page: 1199 year: 2000 end-page: 1207 ident: br000200 article-title: PicSOM–content-based image retrieval with self-organizing maps publication-title: Pattern Recognit. Lett. – volume: 301 start-page: 44 year: 2015 end-page: 60 ident: br000090 article-title: An image watermarking scheme in wavelet domain with optimized compensation of singular value decomposition via artificial bee colony publication-title: Inform. Sci. – volume: 9 start-page: 496 year: 2015 end-page: 505 ident: br000085 article-title: Colour image steganography method based on sparse representation publication-title: IET Image Process. – volume: 50 start-page: 320 year: 2004 end-page: 328 ident: br000205 article-title: Chromatic encoding: a low power encoding technique for digital visual interface publication-title: IEEE Trans. Consum. Electron. – volume: 51 start-page: 124 year: 2015 end-page: 144 ident: br000265 article-title: Color image analysis by quaternion-type moments publication-title: J. Math. Imaging Vis. – volume: 22 year: 2013 ident: br000080 article-title: Adaptive image steganography using contourlet transform publication-title: J. Electron. Imaging – start-page: 1 year: 2016 end-page: 18 ident: br000100 article-title: Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices publication-title: Multimedia Tools Appl. – volume: 10 start-page: 1905 year: 2015 end-page: 1917 ident: br000010 article-title: A strategy of clustering modification directions in spatial image steganography publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 10 start-page: 507 year: 2015 end-page: 518 ident: br000035 article-title: Segmentation-based image copy-move forgery detection scheme publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 34 start-page: 671 year: 2001 end-page: 683 ident: br000140 article-title: Image hiding by optimal LSB substitution and genetic algorithm publication-title: Pattern Recognit. – volume: 152 start-page: 611 year: 2005 end-page: 615 ident: br000170 article-title: Image steganographic scheme based on pixel-value differencing and LSB replacement methods publication-title: IEE Proc., Vis. Image Signal Process. – volume: 30 start-page: 55 year: 2006 end-page: 88 ident: br000185 article-title: An evaluation of image based steganography methods publication-title: Multimedia Tools Appl. – volume: 24 start-page: 13 year: 2010 ident: 10.1016/j.future.2016.11.029_br000245 article-title: Privacy and security for online social networks: challenges and opportunities publication-title: IEEE Netw. doi: 10.1109/MNET.2010.5510913 – volume: 37 start-page: 469 year: 2004 ident: 10.1016/j.future.2016.11.029_br000165 article-title: Hiding data in images by simple LSB substitution publication-title: Pattern Recognit. doi: 10.1016/j.patcog.2003.08.007 – volume: 17 start-page: 334 year: 2014 ident: 10.1016/j.future.2016.11.029_br000025 article-title: Steganography in modern smartphones and mitigation techniques publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2014.2350994 – volume: 279 start-page: 251 year: 2014 ident: 10.1016/j.future.2016.11.029_br000040 article-title: A recent survey of reversible watermarking techniques publication-title: Inform. Sci. doi: 10.1016/j.ins.2014.03.118 – volume: 51 start-page: 1995 year: 2003 ident: 10.1016/j.future.2016.11.029_br000180 article-title: Detection of LSB steganography via sample pair analysis publication-title: IEEE Trans. Signal Process. doi: 10.1109/TSP.2003.812753 – volume: 22 issue: 4 year: 2013 ident: 10.1016/j.future.2016.11.029_br000080 article-title: Adaptive image steganography using contourlet transform publication-title: J. Electron. Imaging doi: 10.1117/1.JEI.22.4.043007 – volume: 5 start-page: 1495 year: 2016 ident: 10.1016/j.future.2016.11.029_br000280 article-title: Visual saliency models for summarization of diagnostic hysteroscopy videos in healthcare systems publication-title: SpringerPlus doi: 10.1186/s40064-016-3171-8 – volume: 9 start-page: 814 year: 2014 ident: 10.1016/j.future.2016.11.029_br000020 article-title: Uniform embedding for efficient JPEG steganography publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2014.2312817 – volume: 22 start-page: 647 year: 2014 ident: 10.1016/j.future.2016.11.029_br000190 article-title: A novel image steganographic approach for hiding text in color images using HSI color model publication-title: Middle-East J. Sci. Res. – ident: 10.1016/j.future.2016.11.029_br000230 doi: 10.1109/PlatCon.2016.7456799 – volume: 13 start-page: 285 year: 2006 ident: 10.1016/j.future.2016.11.029_br000065 article-title: LSB matching revisited publication-title: IEEE Signal Process. Lett. doi: 10.1109/LSP.2006.870357 – volume: 2 start-page: 88 year: 2015 ident: 10.1016/j.future.2016.11.029_br000250 article-title: Anonymous authentication for trustworthy pervasive social networking publication-title: IEEE Trans. Comput. Soc. Syst. doi: 10.1109/TCSS.2016.2519463 – start-page: 1 year: 2016 ident: 10.1016/j.future.2016.11.029_br000075 article-title: CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method publication-title: Multimedia Tools Appl. – volume: 10 start-page: 1905 year: 2015 ident: 10.1016/j.future.2016.11.029_br000010 article-title: A strategy of clustering modification directions in spatial image steganography publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2015.2434600 – volume: 16 start-page: 69 year: 2009 ident: 10.1016/j.future.2016.11.029_br000110 article-title: A generalization of LSB matching publication-title: IEEE Signal Process. Lett. doi: 10.1109/LSP.2008.2008947 – volume: 2 start-page: 30 year: 2016 ident: 10.1016/j.future.2016.11.029_br000255 article-title: Survey of trustworthy pervasive social networking publication-title: Chin, J. Netword Inf. Secur. – volume: 14 start-page: 3652 year: 2014 ident: 10.1016/j.future.2016.11.029_br000215 article-title: Sparse representations-based super-resolution of key-frames extracted from frames-sequences generated by a visual sensor network publication-title: Sensors doi: 10.3390/s140203652 – volume: 14 start-page: 848 year: 2007 ident: 10.1016/j.future.2016.11.029_br000060 article-title: A double layered “plus-minus one” data embedding scheme publication-title: IEEE Signal Process. Lett. doi: 10.1109/LSP.2007.903255 – volume: 9 start-page: 1264 year: 2014 ident: 10.1016/j.future.2016.11.029_br000015 article-title: Investigation on cost assignment in spatial image steganography publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2014.2326954 – volume: 9 start-page: 1938 year: 2015 ident: 10.1016/j.future.2016.11.029_br000135 article-title: A secure method for color image steganography using gray-level modification and multi-level encryption publication-title: KSII Trans. Internet Inf. Syst. – volume: 123 start-page: 157 year: 2015 ident: 10.1016/j.future.2016.11.029_br000030 article-title: Authentication and recovery algorithm for speech signal based on digital watermarking publication-title: Signal Process. doi: 10.1016/j.sigpro.2015.10.023 – volume: 277 start-page: 90 year: 2014 ident: 10.1016/j.future.2016.11.029_br000050 article-title: A new steganography method which preserves histogram: Generalization of LSB〈sup〉++〈sup〉 publication-title: Inform. Sci. doi: 10.1016/j.ins.2014.02.007 – volume: 10 start-page: e0145800 year: 2015 ident: 10.1016/j.future.2016.11.029_br000220 article-title: Quality index for stereoscopic images by separately evaluating adding and subtracting publication-title: PloS One doi: 10.1371/journal.pone.0145800 – volume: 37 start-page: 3292 year: 2010 ident: 10.1016/j.future.2016.11.029_br000130 article-title: High payload steganography mechanism using hybrid edge detector publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2009.09.050 – volume: 28 start-page: 961 year: 2015 ident: 10.1016/j.future.2016.11.029_br000270 article-title: Image segmentation by generalized hierarchical fuzzy C-means algorithm publication-title: J. Intell. Fuzzy Systems – volume: 11 start-page: 87 year: 2015 ident: 10.1016/j.future.2016.11.029_br000275 article-title: Ontology-based secure retrieval of semantically significant visual contents publication-title: J. Korean Inst. Next Gener. Comput. – volume: 14 start-page: 17112 year: 2014 ident: 10.1016/j.future.2016.11.029_br000105 article-title: Mobile-cloud assisted video summarization framework for efficient management of remote sensing data generated by wireless capsule sensors publication-title: Sensors doi: 10.3390/s140917112 – volume: 152 start-page: 611 year: 2005 ident: 10.1016/j.future.2016.11.029_br000170 article-title: Image steganographic scheme based on pixel-value differencing and LSB replacement methods publication-title: IEE Proc., Vis. Image Signal Process. doi: 10.1049/ip-vis:20059022 – volume: 10 start-page: 507 year: 2015 ident: 10.1016/j.future.2016.11.029_br000035 article-title: Segmentation-based image copy-move forgery detection scheme publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2014.2381872 – volume: 21 start-page: 1199 year: 2000 ident: 10.1016/j.future.2016.11.029_br000200 article-title: PicSOM–content-based image retrieval with self-organizing maps publication-title: Pattern Recognit. Lett. doi: 10.1016/S0167-8655(00)00082-9 – volume: 21 start-page: 449 year: 2002 ident: 10.1016/j.future.2016.11.029_br000155 article-title: Steganographic method for secure communications publication-title: Comput. Secur. doi: 10.1016/S0167-4048(02)00515-1 – volume: 5 start-page: 201 year: 2010 ident: 10.1016/j.future.2016.11.029_br000175 article-title: Edge adaptive image steganography based on LSB matching revisited publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2010.2041812 – volume: 40 start-page: 70 year: 2014 ident: 10.1016/j.future.2016.11.029_br000095 article-title: Data hiding in scrambled images: a new double layer security data hiding technique publication-title: Comput. Electr. Eng. doi: 10.1016/j.compeleceng.2013.11.006 – volume: 3 start-page: 1 year: 2008 ident: 10.1016/j.future.2016.11.029_br000240 article-title: Kerckhoffs-based embedding security classes for woa data hiding publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2007.916006 – volume: 5 start-page: 201 year: 2010 ident: 10.1016/j.future.2016.11.029_br000115 article-title: Edge adaptive image steganography based on LSB matching revisited publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2010.2041812 – volume: 30 start-page: 55 year: 2006 ident: 10.1016/j.future.2016.11.029_br000185 article-title: An evaluation of image based steganography methods publication-title: Multimedia Tools Appl. doi: 10.1007/s11042-006-0008-4 – volume: 301 start-page: 44 year: 2015 ident: 10.1016/j.future.2016.11.029_br000090 article-title: An image watermarking scheme in wavelet domain with optimized compensation of singular value decomposition via artificial bee colony publication-title: Inform. Sci. doi: 10.1016/j.ins.2014.12.042 – volume: 51 start-page: 124 year: 2015 ident: 10.1016/j.future.2016.11.029_br000265 article-title: Color image analysis by quaternion-type moments publication-title: J. Math. Imaging Vis. doi: 10.1007/s10851-014-0511-6 – volume: 75 start-page: 14867 year: 2016 ident: 10.1016/j.future.2016.11.029_br000195 article-title: A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image publication-title: Multimedia Tools Appl. doi: 10.1007/s11042-015-2671-9 – volume: 41 start-page: 6123 year: 2014 ident: 10.1016/j.future.2016.11.029_br000120 article-title: A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2014.04.022 – volume: 9 start-page: 496 year: 2015 ident: 10.1016/j.future.2016.11.029_br000085 article-title: Colour image steganography method based on sparse representation publication-title: IET Image Process. doi: 10.1049/iet-ipr.2014.0351 – volume: 3 start-page: 488 year: 2008 ident: 10.1016/j.future.2016.11.029_br000055 article-title: Adaptive data hiding in edge areas of images with spatial LSB domain systems publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2008.926097 – start-page: 1 year: 2016 ident: 10.1016/j.future.2016.11.029_br000100 article-title: Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices publication-title: Multimedia Tools Appl. – volume: 39 start-page: 11517 year: 2012 ident: 10.1016/j.future.2016.11.029_br000125 article-title: A novel technique for image steganography based on a high payload method and edge detection publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2012.02.106 – volume: 40 start-page: 1 year: 2016 ident: 10.1016/j.future.2016.11.029_br000225 article-title: Dual-level security based cyclic18 steganographic method and its application for secure transmission of keyframes during wireless capsule endoscopy publication-title: J. Med. Syst. doi: 10.1007/s10916-016-0473-x – volume: 36 start-page: 1583 year: 2003 ident: 10.1016/j.future.2016.11.029_br000145 article-title: Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy publication-title: Pattern Recognit. doi: 10.1016/S0031-3203(02)00289-3 – volume: 36 start-page: 2875 year: 2003 ident: 10.1016/j.future.2016.11.029_br000150 article-title: A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function publication-title: Pattern Recognit. doi: 10.1016/S0031-3203(03)00221-8 – volume: 73 start-page: 405 year: 2004 ident: 10.1016/j.future.2016.11.029_br000160 article-title: Secret image sharing with steganography and authentication publication-title: J. Syst. Softw. doi: 10.1016/S0164-1212(03)00239-5 – volume: 34 start-page: 671 year: 2001 ident: 10.1016/j.future.2016.11.029_br000140 article-title: Image hiding by optimal LSB substitution and genetic algorithm publication-title: Pattern Recognit. doi: 10.1016/S0031-3203(00)00015-7 – volume: 41 start-page: 888 year: 2012 ident: 10.1016/j.future.2016.11.029_br000285 article-title: The effect of electrocardiogram signal compression using beat reordering and SPIHT on automatic sleep stage classification publication-title: Procedia Eng. doi: 10.1016/j.proeng.2012.07.259 – volume: 50 start-page: 320 year: 2004 ident: 10.1016/j.future.2016.11.029_br000205 article-title: Chromatic encoding: a low power encoding technique for digital visual interface publication-title: IEEE Trans. Consum. Electron. doi: 10.1109/TCE.2004.1277880 – start-page: 1 year: 2015 ident: 10.1016/j.future.2016.11.029_br000210 article-title: A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes publication-title: Multimedia Tools Appl. – volume: 75 start-page: 1947 year: 2016 ident: 10.1016/j.future.2016.11.029_br000070 article-title: Steganalysis of LSB matching using differences between nonadjacent pixels publication-title: Multimedia Tools Appl. doi: 10.1007/s11042-014-2381-8 – volume: 28 start-page: 34 year: 2013 ident: 10.1016/j.future.2016.11.029_br000235 article-title: Efficient visual attention based framework for extracting key frames from videos publication-title: Signal Process., Image Commun. doi: 10.1016/j.image.2012.10.002 – volume: 90 start-page: 727 year: 2010 ident: 10.1016/j.future.2016.11.029_br000005 article-title: Digital image steganography: Survey and analysis of current methods publication-title: Signal Process. doi: 10.1016/j.sigpro.2009.08.010 – volume: 75 start-page: 807 year: 2014 ident: 10.1016/j.future.2016.11.029_br000045 article-title: A technique for digital steganography using chaotic maps publication-title: Nonlinear Dynam. doi: 10.1007/s11071-013-1105-3 – start-page: 1 year: 2016 ident: 10.1016/j.future.2016.11.029_br000260 article-title: A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map publication-title: Inf. Secur. J. |
| SSID | ssj0001731 |
| Score | 2.4783905 |
| Snippet | Image steganography is a growing research field, where sensitive contents are embedded in images, keeping their visual quality intact. Researchers have used... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 951 |
| SubjectTerms | Image and video processing Image steganography Information security Online social networks Security in social networking Uncorrelated color space |
| Title | Image steganography using uncorrelated color space and its application for security of visual contents in online social networks |
| URI | https://dx.doi.org/10.1016/j.future.2016.11.029 |
| Volume | 86 |
| WOSCitedRecordID | wos000437555800082&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1872-7115 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001731 issn: 0167-739X databaseCode: AIEXJ dateStart: 19950201 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JbtswECVcp4deuhdJN_DQW6HAWkkegyJB3RZBUaeFbwJFkbWNSAm8Icd8Wj6tQ3JoK3DRDagPhCGLNqH3PByNZt4Q8gYsvpbGDCIp4yrKmFSRrIWKlC6SGhwUYVyF97dP7PSUj8fic693E2ph1uesbfnVlbj8r1DDMQDbls7-BdybL4UD8B5AhxFgh_GPgB82Ng0HwPsuW9SjfrtyEYGV1ax0xSva1rLZ3hpgT9T2AULnabZLP1xgczvrUa6ni5XTErE570uXRetVNkLYvfUJ5Yuuu3viFEtsm2aNTFPYRQIlpBdbwCeyaTzfPk62lB3J2cwfDWdsZuhJg_lCw7nZzvgycdHfkQYz1qCuOIY1Yr7J28JY2069jQ9_gllnqWu-C7uXN9mcwT1C7ItCg03nXaMsUNLW7-_C9y_Y2Tp8FGN26LVcbNJfcWj1XTEgc1uUe2RXYhcC7izs9wW_Q_YSlgveJ3tHw-Pxh403EDPsiYkrD-WbLsdw97d-7h51XJ6zh-Q-3qvQI8-xR6Sn28fkQegDQnFbeEKuHeXoLcpRRznapRx1lKOOchQoR4FytEM5auynSDl6YainHA2Uo9OWespRTzkaKPeUfD05Pnv3PsLOHpGCy7WMqiQZGK1VzWRmtMgrlitZgC-V5VzrCsY8LTKVcBnrTIuqFkal2phKSTbQpkqfkX570ep9QlU-qFiaiNhwlcFLZHWsiqxWUupacHlA0nBBS4Wy97b7ynkZ8htnpYehtDDAHXEJMByQaDPr0su-_OZ8FrAq0XX1LmkJ9PrlzOf_PPMFubf947wk_eV8pV-Ru2q9nC7mr5GHPwAcy8wr |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Image+steganography+using+uncorrelated+color+space+and+its+application+for+security+of+visual+contents+in+online+social+networks&rft.jtitle=Future+generation+computer+systems&rft.au=Muhammad%2C+Khan&rft.au=Sajjad%2C+Muhammad&rft.au=Mehmood%2C+Irfan&rft.au=Rho%2C+Seungmin&rft.date=2018-09-01&rft.pub=Elsevier+B.V&rft.issn=0167-739X&rft.eissn=1872-7115&rft.volume=86&rft.spage=951&rft.epage=960&rft_id=info:doi/10.1016%2Fj.future.2016.11.029&rft.externalDocID=S0167739X16306768 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-739X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-739X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-739X&client=summon |