Bit Plane Coding based Steganography Technique for JPEG2000 Images and Videos
DOI: https://doi.org/10.12777/ijse.10.1.
Abstract
Full Text:
FULL TEXT PDFReferences
ISO/IEC 15444-1, (2001). Information Technology – JPEG2000 Image Coding System – Part 1: Core Coding System..
Carvajal-Gamez, B. E., Gallegos-Funes F. J., and Rosales-Silva, A. J. (2013). Color local complexity estimation based steganographic method, EXPERT SYSTEMS WITH APPLICATIONS, 40(4): 1132–1142.
DOI: http://dx.doi.org/10.1016/j.eswa.2012.08.024
Chan, C. K. and Cheng, L. M. (2004). Hiding data in images by simple LSB substitution, PATTERN RECOGNITION, 37(3):469–474.
doi:10.1016/j.patcog.2003.08.007
Chang, C. C., Tai, W. L., and Lin, C. C., (2006). A reversible data hiding scheme based on side match vector quantization. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 16(10):1301–1308.
doi: 10.1109/TCSVT.2006.882380
Chang, C. C. et al, (2007). Reversible hiding in DCT-based compressed images. INFORMATION SCIENCES, 177(13): 2768–2786.
doi:10.1016/j.ins.2007.02.019
Chang, C. C., Wu, W. C., and Hu Y.C. (2007). Lossless recovery of a VQ index table with embedded secret data. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 18(3):207–216.
doi:10.4304/jsw.8.3.547-553
Chang, C. C., Nguyen, T. S., and Lin, C. C. (2011). A reversible data hiding scheme for VQ indices using locally adaptive coding. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 22(7): 664–672.
Doi:10.1016/j.jvcir.2011.06.005
Chen, W. J., Chang, C. C., and Le, T. (2010). High payload steganography mechanism using hybrid edge detector. EXPERT SYSTEMS WITH APPLICATIONS, 37(4):3292–3301.
doi:10.1016/j.eswa.2009.09.050
Chen, W. Y. (2008). Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques. APPLIED MATHEMATICS AND COMPUTATION, 196(1): 40–54.
doi:10.1016/j.procs.2015.08.168
http://www.sciencedirect.com/science/article/pii/S1877050915022954
Chu, R., You, X., Kong X., and Ba, X. (2004). DCT-based image steganographic method resisting statistical attacks. Proceedings of IEEE international conference on acoustics, speech, and signal processing, 5.
http://ieeexplore.ieee.org/xpls/abs_all.jsp%3Farnumber%3D1327270
Cox, I. J., Miller, M. L., Bloom, J. A., Fridrich, J., and Kalker, T. (2008). Digital Watermarking and Steganography. 2nd ed., Burlington, MA: Morgan Kaufmann.
Goudia, D., Chaumont M., Puech W. and Said N. H. (2011). A Joint Trellis Coded Quantization Data Hiding Scheme in the JPEG2000 Part-2 Coding Framework, 19th European Signal Processing Conference, pp. 1110-1114, Sept.
http://ieeexplore.ieee.org/xpls/abs_all.jsp%3Farnumber%3D7073918
Hai-ying, G., Yin, X. and Guo-qiang, L. (2008). A steganographic algorithm for JPEG2000 images. IEEE computer society, Int. Conf. on Computer Science and Software Engineering, pp. 1263-1266.
doi: 10.1109/CSSE.2008.139
Hsieh, M. S. (2010). A robust image authentication method based on wavelet transform and Teager energy operator. INTERNATIONAL JOURNAL OF MULTIMEDIA AND ITS APPLICATIONS, 2(3):1-17.
doi: : 10.5121/ijma.2010.2301
http://airccse.org/journal/jma/0810ijma01.pdf
Ioannidou, A., Halkidis, S. T., and Stephanides, G. (2012). A novel technique for image steganography based on a high payload method and edge detection. EXPERT SYSTEMS WITH APPLICATIONS, 39(14): 11517–11524.
http://dl.acm.org/citation.cfm%3Fid%3D2240648
doi:10.1016/j.eswa.2012.02.106
Ishida, T., Yamawak,i K., Noda H., and Niimi M. (2008). Performance improvement of JPEG2000 steganography using QIM. Intelligent Information Hiding and Multimedia Signal Processing, International Conference, IEEE Computer Society, pp: 155-158.
doi:10.1109/IIH-MSP.2008.120
Ishida T., Yamawaki K., Noda H. and Niimi M. (2009). An Improved QIM-JPEG2000 Steganography and Its Evaluation by Steganalysis. JOURNAL OF INFORMATION PROCESSING, 17: 267-272.
http://doi.org/10.2197/ipsjjip.17.267
KAKADU software, www.kakadusoftware.com/
Jafari, R., Ziou, D., and Rashidi, M. M. (2013). Increasing image compression rate using steganography. EXPERT SYSTEMS WITH APPLICATIONS, 40(17): 6918–6927.
doi:10.1016/j.eswa.2013.06.008
Jin, H. L., Fujiyoshi, M., Sheki Y. and Kiya, H. (2007). A Data Hiding Method for JPEG2000 Coded Images Using Module Arithmetic. ELECTRONICS AND COMMUNICATIONS IN JAPAN, 90(7): 37-45.
doi: 10.1002/ecjc.20286
Ni, Z., Shi, Y. Q., Ansari, N., and Su, W., (2006). Reversible data hiding. IEEE Transactions on Circuits Systems and Video Technology, 16(3), pp. 354–362.
http://ieeexplore.ieee.org/xpls/abs_all.jsp%3Farnumber%3D1608163
doi: 10.1109/TCSVT.2006.869964
Noda, H., Spaulding, J., Shirazi, M. N., Kawaguchi, E. (2002). Application of bit plane decomposition steganography to JPEG2000 encoded images. IEEE Signal Processing Letters, 9(12), pp. 410-413.
http://ieeexplore.ieee.org/xpls/abs_all.jsp%3Farnumber%3D1159625
doi: 10.1109/LSP.2002.806056
Noda, H., Niimi, M., and Kawaguchi, E. (2006). High-performance JPEG steganography using quantization index modulation in DCT domain. PATTERN RECOGNITION LETTERS, 27(5): 455–461, 2006.
doi:10.1016/j.patrec.2005.09.008
Ohyama, S., Niimi, M., Yamawaki, K., and Noda, H. (2008). Reversible data hiding for full color JPEG2000 compressed bit-stream preserving bit-depth information. In Proc. ICPR 08: the 19th International Conference on Pattern Recognition, pp. 1-4, December.
doi:10.1109/ICPR.2008.4761625
Sweldens W. (1997). The lifting scheme: a custom-design construction of second generation wavelets. SIAM JOURNAL OF MATHEMATICAL ANALYSIS, 29:511-546.
http://140.129.20.249/~jmchen/wavelets/Tutorials/sweldens/lift2.pdf
Sajedi, H., and Jamzad, M. (2010). BSS: Boosted steganography scheme with cover image preprocessing. EXPERT SYSTEMS WITH APPLICATIONS, 37(12): 7703–7710.
doi:10.1016/j.eswa.2010.04.071
Su, P. C., and Kuo, J. (2003). Steganography in JPEG2000 compressed images. IEEE Transactions on Consumer Electronics, 49(4), pp. 824-832.
doi:10.1109/TCE.2003.1261161
Wu, D. C., and Tsai, W. H. (2003). A steganographic method for images by pixel-value differencing. PATTERN RECOGNITION LETTERS, 24(9):1613–1626.
doi:10.1016/S0167-8655(02)00402-6
Yang, C. H., Yang W. J., Huang, C. T., and Wang, S. J. (2011). Reversible steganography based on side match and hit pattern for VQ-compressed images. INFORMATION SCIENCES, 181(11):2218–2230.
doi:10.1016/j.ins.2011.01.015
Yang, C. H., Weng, C. Y., Wang, S. J., and Sun, H. M. (2008). Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Transactions on Information Forensics and Security, 3(3), pp. 488–497.
doi:10.1109/TIFS.2008.926097
Zhang, L., Wang, H., and Wu, R., (2009). A high capacity steganography scheme for JPEG2000 baseline system. IEEE Transactions on Image Processing, 18(8), pp. 1797-1803.
doi: 10.1109/TIP.2009.2021544
http://ieeexplore.ieee.org/xpls/abs_all.jsp%3Farnumber%3D4840534