Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2018 (2018), Article ID 5216029, 8 pages
https://doi.org/10.1155/2018/5216029
Research Article

Embedded FPGA Design for Optimal Pixel Adjustment Process of Image Steganography

1Chung Yuan Christian University, Taoyuan City, Taiwan
2Chien Hsin University of Science and Technology, Taoyuan City, Taiwan

Correspondence should be addressed to Cheng-Yuan Chang; wt.ude.ucyc@ycc

Received 4 November 2017; Revised 5 February 2018; Accepted 19 February 2018; Published 22 March 2018

Academic Editor: Ahmed Refaey

Copyright © 2018 Chiung-Wei Huang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. R. Poornima and R. J. Iswarya, “An overview of digital image steganography,” International Journal of Computer Science & Engineering Survey, vol. 4, no. 1, pp. 23–31, 2013. View at Google Scholar
  2. B. Kaur, A. Kaur, and J. Singh, “Steganographic approach for hiding image in DCT domain,” International Journal of Advances in Engineering & Technology, vol. 1, no. 3, pp. 72–78, 2011. View at Google Scholar
  3. J. Song, Y. Zhu, and J. Song, “Steganography: an information hiding method base on logistic map in DCT domain,” Advances in Information Sciences and Service Sciences (AISS), vol. 4, no. 2, 2012. View at Google Scholar
  4. Q. Gu and T. Gao, “A novel reversible watermarking algorithm based on wavelet lifting scheme,” ICIC Express Letters, vol. 3, no. 3, pp. 397–402, 2009. View at Google Scholar · View at Scopus
  5. A. A. Sheju and U. L. Kulkarni, “A secure skin tone based steganography using wavelet transform,” International Journal of Computer Theory and Engineering, vol. 3, no. 1, pp. 1793–8201, 2011. View at Google Scholar
  6. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol. 35, no. 3-4, pp. 313–335, 1996. View at Publisher · View at Google Scholar · View at Scopus
  7. X. Zhang, “Reversible data hiding with optimal value transfer,” IEEE Transactions on Multimedia, vol. 15, no. 2, pp. 316–325, 2013. View at Publisher · View at Google Scholar · View at Scopus
  8. R.-Z. Wang, C.-F. Lin, and J.-C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, vol. 34, no. 3, pp. 671–683, 2001. View at Publisher · View at Google Scholar · View at Scopus
  9. C.-K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition, vol. 37, no. 3, pp. 469–474, 2004. View at Publisher · View at Google Scholar · View at Scopus
  10. W. Wang, J. Ye, T. Wang, and W. Wang, “Reversible data hiding scheme based on significant-bit-difference expansion,” IET Image Processing, vol. 11, no. 11, pp. 1002–1014, 2017. View at Publisher · View at Google Scholar
  11. C.-K. Chan and L. M. Cheng, “Improved hiding data in images by optimal moderately-significant-bit replacement,” IEEE Electronics Letters, vol. 37, no. 16, pp. 1017-1018, 2001. View at Publisher · View at Google Scholar · View at Scopus
  12. C.-C. Chang, C.-C. Lin, and Y.-H. Chen, “Reversible data-embedding scheme using differences between original and predicted pixel values,” IET Information Security, vol. 2, no. 2, pp. 35–46, 2008. View at Publisher · View at Google Scholar · View at Scopus
  13. W.-L. Tai, C.-M. Yeh, and C.-C. Chang, “Reversible data hiding based on histogram modification of pixel differences,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 6, pp. 906–910, 2009. View at Publisher · View at Google Scholar · View at Scopus
  14. P. Tsai, Y.-C. Hu, and H.-L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Processing, vol. 89, no. 6, pp. 1129–1143, 2009. View at Publisher · View at Google Scholar · View at Scopus
  15. J.-L. Zhang, Q. Wu, Y.-P. Ding et al., “Techniques for Design and Implementation of an FPGA-Specific Physical Unclonable Function,” Journal of Computer Science and Technology, vol. 31, no. 1, pp. 124–136, 2016. View at Publisher · View at Google Scholar · View at Scopus