Steganographic access control in data hiding using run-length encoding and modulo-operations
Open Access
- 16 June 2011
- journal article
- research article
- Published by Wiley in Security and Communication Networks
- Vol. 9 (2), 139-148
- https://doi.org/10.1002/sec.333
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Embedding capacity raising in reversible data hiding based on prediction of difference expansionJournal of Systems and Software, 2010
- A high stego-image quality steganographic scheme with reversibility and high payload using multiple embedding strategyJournal of Systems and Software, 2009
- Prediction-based reversible data hidingInformation Sciences, 2009
- Inverted pattern approach to improve image quality of information hiding by LSB substitutionPattern Recognition, 2008
- Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain SystemsIEEE Transactions on Information Forensics and Security, 2008
- Access control protocols with two-layer architecture for wireless networksComputer Networks, 2007
- Efficient Steganographic Embedding by Exploiting Modification DirectionIEEE Communications Letters, 2006
- New image steganographic methods using run-length approachInformation Sciences, 2006
- Hiding data in images by simple LSB substitutionPattern Recognition, 2004
- High capacity image steganographic modelIEE Proceedings - Vision, Image, and Signal Processing, 2000