Analysis of properties of reversible steganography methods
Article Sidebar
Open full text
Published:
Nov 30, 2018
Issue Vol. 8 (2018)
Articles
-
Object recognition on video from camera to computer
Oleksandr Cherednyk, Elżbieta Miłosz215-219
-
System and hardware security options available for users on devices running Android operating system
Tomasz Borysiewicz220-225
-
Efficiency of creating application’s presentation layer with frameworks AngularJS, Angular2, BackboneJS
Monika Tobiańska, Jakub Smołka226-229
-
User monitoring system using of social networks - structure and analysis of the opportunities
Sofiia Lahoda, Marek Miłosz230-234
-
Comparison of object-relational data mapping technology in Symfony 3 framework
Karol Sawłuk, Marek Miłosz235-240
-
Time analysis of the performance of Windows 10 and Windows 8.1 based on mobile application
Jacek Chmiel, Maria Skublewska-Paszkowska241-246
-
Comparison of selected network communication methods on the Android platform
Przemysław Żydek, Jakub Smołka247-251
-
Comparison of tools for automated tests of the graphical user interface using the the Sikuli and AutoIT example
Tomasz Paczuski, Beata Pańczyk252-257
-
Hosting models comparison of ASP.NET Core application
Kamil Zdanikowski, Beata Pańczyk258-262
-
Performance analysis of relational databases Oracle and MS SQL based on desktop application
Grzegorz Dziewit, Jakub Korczyński, Maria Skublewska-Paszkowska263-269
-
Verification methods of a programmer’s knowledge and skills
Paweł Hajduk, Norbert Wieruszewski, Maria Skublewska-Paszkowska270-276
-
Possibility analysis of environmental threat monitoring with the Arduino platform
Krzysztof Lenart, Małgorzata Plechawska-Wójcik277-281
-
Comparative analysis of mobile applications for IT project management
Ewelina Wlaszczyk, Elżbieta Miłosz282-285
-
Comparing the performance of integration platforms
Bartłomiej Karol Flis, Łukasz Kołyga, Maria Skublewska-Paszkowska286-291
-
Analysis of properties of reversible steganography methods
Piotr Zimnicki, Grzegorz Kozieł292-297
-
Performance comparison of automatic tests written in Selenium WebDriver and HP UFT
Krzysztof Drążek, Maria Skublewska-Paszkowska298-301
Main Article Content
DOI
Authors
Piotr Zimnicki
Institute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland, Poland
Grzegorz Kozieł
Institute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland, Poland
Abstract
Steganography is a science that deals with hiding information in other information, and it's becoming increasingly popular with rapid growth of Internet utilization. Reversible steganography methods allow lossless recovery of not only the message, but the cover image as well. Different methods have different characteristics, and thus different applications. This paper aims to deepen the understanding of selected reversible methods, their strong and weak point, through both theoretical and practical analysis. The comparison of chosen methods is presented in the paper.
Keywords:
reversible steganography; graphics; spatial domain
References
[1] Y. Shi. Reversible data hiding, Department of Electrical and Computer Engineering, New Jersey Institute of Technology, 2005.
[2] Zhicheng Ni, Yun-Qing Shi, Nirwan Ansari. Reversible data hiding, IEEE Transaction on Circuits and Systems for Video Technology, 16, 2006.
[3] Chia-Chen Lin, Wei-Liang Tai, Chin-Chen Chang. Multilevel reversible data hiding based on histogram modification of difference images, Pattern Recognition, 41, 2008.
[4] Ching-yu Yang, Chih-Hung Lin, Wu-Chih Hu. Reversible data hiding for high quality images based on integer wavelet transform, Journal of Information Hiding and Multimedia Signal Processing, 2, 2012.
[5] C.P. Sumathi, T. Santanam, G. Umamaheswari. A study of various steganographic techniques used for information hiding, International Journal of Computer Science and Engineering Survey, 4, 2013.
[6] Divya .A, S. Thenmozhi. Steganography: Various techniques in spatial and transform domain, International Journal of Advanced Scientific Research and Management, 1, 2016.
[7] Yuling Liu, Xinxin Qu, Goujiang Xin. A ROI-based reversible data hiding scheme in encrypted medical images, Journal of Visual Communication and Image Representation, 39, 2016
[8] J. Tian. Reversible data embedding using a difference expansion, IEEE Transaction on Circuits and Systems for Video Technology, 13, 2003
[9] Mehmet U. Celik, Gaurav Sharma, A. Murat Tekalp. Reversible data hiding, International Conference on Image Processing, 2, 2002
[2] Zhicheng Ni, Yun-Qing Shi, Nirwan Ansari. Reversible data hiding, IEEE Transaction on Circuits and Systems for Video Technology, 16, 2006.
[3] Chia-Chen Lin, Wei-Liang Tai, Chin-Chen Chang. Multilevel reversible data hiding based on histogram modification of difference images, Pattern Recognition, 41, 2008.
[4] Ching-yu Yang, Chih-Hung Lin, Wu-Chih Hu. Reversible data hiding for high quality images based on integer wavelet transform, Journal of Information Hiding and Multimedia Signal Processing, 2, 2012.
[5] C.P. Sumathi, T. Santanam, G. Umamaheswari. A study of various steganographic techniques used for information hiding, International Journal of Computer Science and Engineering Survey, 4, 2013.
[6] Divya .A, S. Thenmozhi. Steganography: Various techniques in spatial and transform domain, International Journal of Advanced Scientific Research and Management, 1, 2016.
[7] Yuling Liu, Xinxin Qu, Goujiang Xin. A ROI-based reversible data hiding scheme in encrypted medical images, Journal of Visual Communication and Image Representation, 39, 2016
[8] J. Tian. Reversible data embedding using a difference expansion, IEEE Transaction on Circuits and Systems for Video Technology, 13, 2003
[9] Mehmet U. Celik, Gaurav Sharma, A. Murat Tekalp. Reversible data hiding, International Conference on Image Processing, 2, 2002
Article Details
Abstract views: 282
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
