Automatic region selection method to enhance image-based steganography
Abstract
Full Text:
PDFReferences
N. Patel and S. Meena, "LSB based image steganography using dynamic key cryptography," presented at the International Conference on Emerging Trends in Communication Technologies (ETCT), 2016.
S. Almuhammadi and A. Al-Shaaby, "A survey on recent approaches combining cryptography and steganography," Computer Science Information Technology (CS IT), 2017.
M. A. Alsarayreh, M. A. Alia, and K. A. Maria, "A Novel Image Steganographic System Based on Exact Matching Algorithm and Key-Dependent Data Technique," Journal of Theoretical and Applied Information Technology, vol. 95, p. 1212, 2017.
A. Baby and H. Krishnan, "Combined Strength of Steganography and Cryptography-A Literature Survey," International Journal of Advanced Research in Computer Science, vol. 8, 2017.
J. Ali and S. P. Ghrera, "CWEA: A Digital Video Copyright Protection Scheme," International Journal of Computer Information Systems and Industrial Management Applications. ISSN, vol. vol. 10, pp. 2150-7988, 2018.
M. Mishra, G. Tiwari, and A. K. Yadav, "Secret communication using public key steganography," presented at the International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), 2014.
B. Furht, E. Akar, and W. A. Andrews, Digital Image Processing: Practical Approach: Springer, 2018.
J. C. Russ, The image processing handbook: CRC press, 2016.
S. Sun, "A new information hiding method based on improved BPCS steganography," Advances in Multimedia, vol. 2015, 2015.
K. Joshi, K. Puniani, and R. Yadav, "A Review on Different Image Steganography Techniques," Digital Image Processing, vol. 8, pp. 179-186, 2016.
A. Y. Tuama, M. A. Mohamed, A. Muhammed, and M. H. Zurina, "Randomized Pixel Selection for Enhancing LSB Algorithm Security against Brute-Force Attack," Journal of Mathematics and Statistics vol. 13, pp. 127-138, 2017.
A. Tiwari, S. R. Yadav, and N. Mittal, "A review on different image steganography techniques," International Journal of Engineering and Innovative Technology (IJEIT) Volume, vol. 3, pp. 19-23, 2014.
A. Y. Taqa and H. A. Jalab, "Increasing the reliability of fuzzy inference system-based skin detector," American Journal of Applied Sciences, vol. 7, p. 1129, 2010.
M. R. Mahmoodi and S. M. Sayedi, "A Comprehensive Survey on Human Skin Detection," International Journal of Image, Graphics & Signal Processing, vol. 8, 2016.
R. S. Ankit Uppal, Renuka ngapal, Aakash gupta, "Merging Cryptography and Steganography Combination of Cryptography: RC6 Enhanced Ciphering and Steganography: jpeg," International Journal of Advanced Computational Engineering and Networking, vol. 2, Oct. 2014.
S. Saraireh, "A Secure Data Communication system using cryptography and steganography," International Journal of Computer Networks & Communications, vol. 5, p. 125, 2013.
M. E. Saleh, A. A. Aly, and F. A. Omara, "Data Security Using Cryptography and Steganography Techniques," IJACSA) International Journal of Advanced Computer Science and Applications, vol. 7, pp. 390-397, 2016.
A. A. Pujari; and S. S. Shinde, "Data Security using Cryptography and Steganography," IOSR Journal of Computer Engineering, vol. 18, 2016.
A. Kumar and R. Sharma, "A secure image steganography based on RSA algorithm and hash-LSB Technique," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, 2013.
S. D. M. Satar, N. A. Hamid, F. Ghazali, R. Muda, and M. Mamat, "A New Model for Hiding Text in an Image Using Logical Connective," International Journal of Multimedia and Ubiquitous Engineering, vol. 10, pp. 195-202, 2015.
A. Dhamija and V. Dhaka, "A novel cryptographic and steganographic approach for secure cloud data migration," presented at the 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015.
B. Pillai, M. Mounika, P. J. Rao, and P. Sriram, "Image steganography method using k-means clustering and encryption techniques," presented at the 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2016.
R. Indrayani, H. A. Nugroho, R. Hidayat, and I. Pratama, "Increasing the security of mp3 steganography using AES Encryption and MD5 hash function," presented at the 2016 2nd International Conference on Science and Technology-Computer (ICST), 2016.
K. D. Patel and S. Belani, "Image encryption using different techniques: A review," International Journal of Emerging Technology and Advanced Engineering, vol. 1, pp. 30-34, 2011.
A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, "Digital image steganography: Survey and analysis of current methods," Signal processing, vol. 90, pp. 727-752, 2010.
S. Jindal and N. Kaur, "Digital image steganography survey and analysis of current methods," International Journal of Computer Science and Information Technology & Security, vol. 6, pp. 10-13, 2016.
B. Li;, J. He;, J. Huang;, and Y. Q. Shi;, "A Survey on Image Steganography and Steganalysis," Journal of Information Hiding and Multimedia Signal Processing, vol. 2, 2011.
V. Pachghare, Cryptography and information security: PHI Learning Private Limited, Delhi, India, Second Edition, 2015.
O. F. Rashid, Z. A. Othman, and S. Zainudin, "A novel DNA sequence approach for network intrusion detection system based on cryptography encoding method," International Journal on Advanced Science, Engineering and Information Technology, vol. 7, pp. 183-189, 2017.
K. U. Singh, "A Survey on Image Steganography Techniques," International Journal of Computer Applications, vol. 97, 2014.
A. H. Al-Hamami and I. A. Aldariseh, "Enhanced method for RSA cryptosystem algorithm," presented at the Advanced Computer Science Applications and Technologies (ACSAT), 2012 International Conference on, 2012.
S. Kolkur, D. Kalbande, P. Shimpi, C. Bapat, and J. Jatakia, "Human skin detection using RGB, HSV and YCbCr color models," arXiv preprint arXiv:1708.02694, 2017.
S. Bilal, R. Akmeliawati, M. J. E. Salami, and A. A. Shafie, "Dynamic approach for real-time skin detection," Journal of Real-Time Image Processing, vol. 10, pp. 371-385, 2015.
K. Gautam and S. K. Thangavel, "Video analytics-based intelligent surveillance system for smart buildings," Soft Computing, vol. 23, pp. 2813-2837, 2019.
R. D. F. Feitosa, A. da Silva Soares, and L. C. Pereyra, "A New Clustering-based Thresholding Method for Human Skin Segmentation Using HSV Color Space," presented at the 2018 IEEE Symposium on Computers and Communications (ISCC), 2018.
T. J. McBride, N. Vandayar, and K. J. Nixon, "A Comparison of Skin Detection Algorithms for Hand Gesture Recognition," in 2019 Southern African Universities Power Engineering Conference/Robotics and Mechatronics/Pattern Recognition Association of South Africa (SAUPEC/RobMech/PRASA), 2019, pp. 211-216.
K. Yadav, L. P. Saxena, B. Ahmed, and Y. K. Krishnan, "Hand Gesture Recognition using Improved Skin and Wrist Detection Algorithms for Indian Sign," Journal of Network Communications and Emerging Technologies (JNCET) www. jncet. org, vol. 9, 2019.
J. Wehrmann, G. S. Simões, R. C. Barros, and V. F. Cavalcante, "Adult content detection in videos with convolutional and recurrent neural networks," Neurocomputing, vol. 272, pp. 432-438, 2018.
J. S. Lee, Y. M. Kuo, P. C. Chung, and E. L. Chen, "Naked image detection based on adaptive and extensible skin color model," Pattern Recognition, vol. 40, pp. 2261-2270, Aug 2007.
D. Ganguly, M. H. Mofrad, and A. Kovashka, "Detecting Sexually Provocative Images," presented at the 2017 IEEE Winter Conference on Applications of Computer Vision (WACV), 2017.
R. Zainuddin, S. Naji, and J. Al-Jaafar, "Suppressing False Negatives in Skin Segmentation," presented at the International Conference on Future Generation Information Technology, 2010.
L.-p. Lee and K.-w. Wong, "An elliptic curve random number generator," in Communications and Multimedia Security Issues of the New Century, ed: Springer, 2001, pp. 127-133.
A. K. Hussain, "A Modified RSA Algorithm for Security Enhancement and Redundant Messages Elimination Using K-Nearest Neighbor Algorithm," IJISET-International Journal of Innovative Science, Engineering & Technology, vol. 2, pp. 858-862, 2015.
A. Senarathne and K. De Zoysa, "ILSB: Indexing with Least Significant Bit Algorithm for Effective Data Hiding," International Journal of Computer Applications vol. 161, 2014.
G. Swain and S. K. Lenka, "A novel steganography technique by mapping words with LSB array," International Journal of Signal and Imaging Systems Engineering, vol. 8, pp. 115-122, 2015.
M. Hussain and M. Hussain, "A Survey of Image Steganography Techniques," International Journal of Advanced Science and Technology, vol. 54, 2013.
J. Rani and T. A. Khan, "Performance Optimized DCT Domain Watermarking Technique with JPEG," International Journal of innovative Technology and Exploring Engineering, vol. 4, 2014.
K. Rao and H. Wu, "Structural similarity based image quality assessment," in Digital Video image quality and perceptual coding, ed: CRC Press, 2005, pp. 261-278.
The USC-SIPI image database [Online] [Online].
DOI: http://dx.doi.org/10.21533/pen.v8i1.1092
Refbacks
- There are currently no refbacks.
Copyright (c) 2020 Sinan A. Naji, Hatem N. Mohaisen, Qusay S. Alsaffar, Hamid A. Jalab

This work is licensed under a Creative Commons Attribution 4.0 International License.
ISSN: 2303-4521
Digital Object Identifier DOI: 10.21533/pen
This work is licensed under a Creative Commons Attribution 4.0 International License