TY - GEN
T1 - A comparative study of PVD-based schemes for data hiding in digital images
AU - El-Alfy, El Sayed M.
AU - Al-Sadi, Azzat A.
PY - 2011
Y1 - 2011
N2 - Unlike data encryption, steganography provides a crucial means for hiding confidential data into cover media so that the unauthorized person will not be aware of the existence of this data. This is particularly useful for protecting sensitive data that needs to be transmitted over a public access network such as the Internet. Several schemes have been proposed based on pixel value differencing with an attempt to increase the embedding capacity of secret data into digital images without significant loss in the perceived quality of the cover images. This paper aims to survey a number of methods that depend on or extend the pixel value differencing scheme. It also provides empirical comparison and discussion of the differences between the various methods.
AB - Unlike data encryption, steganography provides a crucial means for hiding confidential data into cover media so that the unauthorized person will not be aware of the existence of this data. This is particularly useful for protecting sensitive data that needs to be transmitted over a public access network such as the Internet. Several schemes have been proposed based on pixel value differencing with an attempt to increase the embedding capacity of secret data into digital images without significant loss in the perceived quality of the cover images. This paper aims to survey a number of methods that depend on or extend the pixel value differencing scheme. It also provides empirical comparison and discussion of the differences between the various methods.
UR - https://www.scopus.com/pages/publications/84857702368
U2 - 10.1109/AICCSA.2011.6126588
DO - 10.1109/AICCSA.2011.6126588
M3 - Conference contribution
AN - SCOPUS:84857702368
SN - 9781457704741
T3 - Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA
SP - 144
EP - 149
BT - Proceedings of the 2011 9th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2011
ER -