Image steganography method based on PVD and modulus function
The traditional steganography methods with Pixel Value Differencing (PVD) usually only deal with the PVD in the horizontal direction but ignore the vertical one. In this paper, the cover image is divided into 2×2 nonoverlapping blocks, then the modulus function method is used in horizontal direction...
Saved in:
| Published in | 2011 International Conference on Electronics, Communications and Control pp. 282 - 284 |
|---|---|
| Main Authors | , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.09.2011
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 1457703203 9781457703201 |
| DOI | 10.1109/ICECC.2011.6067590 |
Cover
| Abstract | The traditional steganography methods with Pixel Value Differencing (PVD) usually only deal with the PVD in the horizontal direction but ignore the vertical one. In this paper, the cover image is divided into 2×2 nonoverlapping blocks, then the modulus function method is used in horizontal direction and the simple PVD method is used in vertical direction for steganography. In addition, the falling-off boundary problem is solved. Experimental results show that the proposed approach provides higher stego-image quality, larger embedding capacity, and can against common attacks. |
|---|---|
| AbstractList | The traditional steganography methods with Pixel Value Differencing (PVD) usually only deal with the PVD in the horizontal direction but ignore the vertical one. In this paper, the cover image is divided into 2×2 nonoverlapping blocks, then the modulus function method is used in horizontal direction and the simple PVD method is used in vertical direction for steganography. In addition, the falling-off boundary problem is solved. Experimental results show that the proposed approach provides higher stego-image quality, larger embedding capacity, and can against common attacks. |
| Author | Feng Pan Xiaoyuan Yang Jun Li |
| Author_xml | – sequence: 1 surname: Feng Pan fullname: Feng Pan organization: Electron. Dept., Coll. of the Armed Police Force, Xi'an, China – sequence: 2 surname: Jun Li fullname: Jun Li email: lijun9250lj@163.com organization: Electron. Dept., Coll. of the Armed Police Force, Xi'an, China – sequence: 3 surname: Xiaoyuan Yang fullname: Xiaoyuan Yang organization: Key Lab. of Network & Inf. Security of the Minist. of Educ., Xidian Univ., Xi'an, China |
| BookMark | eNo1j09LwzAchiMq6Ga_gF7yBVqT5j94kTq1MNCDeh1p80tXWZPRtId9-w2cz-XlubzwLNBViAEQuqekoJSYx7paVVVREkoLSaQShlygzChNuVCKsJLqS7T4F8JuUJbSLzkhpSmVukVP9WA7wGmCzobYjXa_PeABpm10uLEJHI4Bf_68YBscHqKbd3PCfg7t1Mdwh6693SXIzrtE36-rr-o9X3-81dXzOu-pElPeauBAXOk1Vc6BahvtvSXQtI55KR0TUBphrPNSnFK4aDi3HLgXmgnSMLZED3-_PQBs9mM_2PGwOQezI42fS0E |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICECC.2011.6067590 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9781457703218 145770319X 1457703211 9781457703195 |
| EndPage | 284 |
| ExternalDocumentID | 6067590 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
| ID | FETCH-LOGICAL-i175t-c8e4e0d2f817dde7cb8ffa0ebcd3f66d35e2959adf6520145b44a4e4f58350b33 |
| IEDL.DBID | RIE |
| ISBN | 1457703203 9781457703201 |
| IngestDate | Wed Aug 27 02:49:07 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i175t-c8e4e0d2f817dde7cb8ffa0ebcd3f66d35e2959adf6520145b44a4e4f58350b33 |
| PageCount | 3 |
| ParticipantIDs | ieee_primary_6067590 |
| PublicationCentury | 2000 |
| PublicationDate | 2011-Sept. |
| PublicationDateYYYYMMDD | 2011-09-01 |
| PublicationDate_xml | – month: 09 year: 2011 text: 2011-Sept. |
| PublicationDecade | 2010 |
| PublicationTitle | 2011 International Conference on Electronics, Communications and Control |
| PublicationTitleAbbrev | ICECC |
| PublicationYear | 2011 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0000669277 |
| Score | 1.5753995 |
| Snippet | The traditional steganography methods with Pixel Value Differencing (PVD) usually only deal with the PVD in the horizontal direction but ignore the vertical... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 282 |
| SubjectTerms | Data mining Embedding capacity Force Histograms Image quality Information security modulus function Pixel Value Differencing(PVD) PSNR steganography |
| Title | Image steganography method based on PVD and modulus function |
| URI | https://ieeexplore.ieee.org/document/6067590 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwGA1zJ08qm_ibHDzaLU3SpAFvdWMTJjs42W3kp4iuHdpe_OtN2m6iePDWllISPpr38uV77wPgOhZaOEZ0RGONIirDP2ckjUSQ_BCDFE6C3nn2wCYLer9Mlh1ws9PCWGvr4jM7CJf1Wb4pdBVSZUMW6K3wG_Q9nrJGq7XLp3joFJjzWruVcB76gpOtpVN7H29FM0gMp9koyxoHz_arP9qr1OgyPgCz7biaopLXQVWqgf78Zdn434Efgv63jg_Odwh1BDo274Hb6dqvIdBH91nmrWE1bBpJw4BpBhY5nD_dQZkbuC5M9VZ9wAB_IYR9sBiPHrNJ1PZQiF48MSgjnVpqkcEujblfybhWqXMSWaUNcYwZklgsEiGNYwkOR4yKUkktdYmnZkgRcgy6eZHbEwA99eIq9dsPzRXlDPk3GY6ZJJ4RWInVKeiFma82jU3Gqp302d-Pz8F-k54N5VoXoFu-V_bS43uprurAfgG7KaAr |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV27TsMwFLWqMsAEqEW88cBI2iR-xRJbaNVAW3VoUbfKryAETRAkC1-PnaRFIAa2JIoiW1fxOb6-51wArgOueEqR8nCgfA8L989pgT3uJD9I-zIkTu88mdLRAt8vybIFbrZaGGNMVXxmeu6yOsvXuSpdqqxPHb3ldoO-QzDGpFZrbTMqFjx5yFil3iKMuc7gaGPq1NwHG9mMz_tJPIjj2sOz-e6PBisVvgz3wWQzsrqs5KVXFrKnPn-ZNv536Aeg-63kg7MtRh2Clsk64DZZ21UE2vg-iayxrIZ1K2noUE3DPIOzxzsoMg3XuS5fyw_oANAFsQsWw8E8HnlNFwXv2VKDwlORwcbXYRoFzK5lTMkoTYVvpNIopVQjYkJOuNApJaE7ZJQYC2xwSiw58yVCR6Cd5Zk5BtCSLyYjuwFRTGJGffsmDQMqkOUERoTyBHTczFdvtVHGqpn06d-Pr8DuaD4Zr8bJ9OEM7NXJWle8dQ7axXtpLizaF_KyCvIXVjijeA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2011+International+Conference+on+Electronics%2C+Communications+and+Control&rft.atitle=Image+steganography+method+based+on+PVD+and+modulus+function&rft.au=Feng+Pan&rft.au=Jun+Li&rft.au=Xiaoyuan+Yang&rft.date=2011-09-01&rft.pub=IEEE&rft.isbn=9781457703201&rft.spage=282&rft.epage=284&rft_id=info:doi/10.1109%2FICECC.2011.6067590&rft.externalDocID=6067590 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781457703201/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781457703201/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781457703201/sc.gif&client=summon&freeimage=true |