Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2018, Article ID 6256872, 8 pages
https://doi.org/10.1155/2018/6256872
Research Article

A Modification-Free Steganography Method Based on Image Information Entropy

1School of Electronic Information, Wuhan University, Wuhan, China
2College of Physical Science and Technology, Huazhong Normal University, Wuhan, China

Correspondence should be addressed to Jianbin Wu; nc.ude.uncc.liam@nibnaijuw

Received 29 September 2017; Revised 4 December 2017; Accepted 6 February 2018; Published 26 March 2018

Academic Editor: Zhenxing Qian

Copyright © 2018 Xia ShuangKui and Jianbin Wu. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. P. Wang and Q. Ma, “Information hiding technology based on least significant bit,” Information Technology Journal, vol. 12, no. 20, pp. 5681–5684, 2013. View at Publisher · View at Google Scholar · View at Scopus
  2. K. Muhammad, J. Ahmad, H. Farman, Z. Jan, M. Sajjad, and S. W. Baik, “A secure method for color image steganography using gray-level modification and multi-level encryption,” KSII Transactions on Internet and Information Systems, vol. 9, no. 5, pp. 1938–1962, 2015. View at Publisher · View at Google Scholar · View at Scopus
  3. J. Q. Xie, Q. Xie, and D. Z. Huang, “Image information hiding algorithm with high security based on run-length,” Computer Science, 2014. View at Google Scholar
  4. S. K. Bandyopadhyay, T. U. Paul, and A. Raychoudhury, “A novel steganographic technique based on 3D-DCT approach,” Computer and Information Science, vol. 3, no. 4, 2010. View at Google Scholar
  5. J. Song, Y. Zhu, and J. Song, “An information hiding method base on logistic map in DCT domain,” Advances in Information Sciences and Service Sciences, vol. 4, no. 2, pp. 32–39, 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. Q. Sun, P. Guan, Y. Qiu et al., “DWT domain information hiding approach using detail sub-band feature adjustment,” Telkomnika Indonesian Journal of Electrical Engineering, vol. 11, no. 7, 2013. View at Google Scholar
  7. M. Bilal, S. Imtiaz, W. Abdul, S. Ghouzali, and S. Asif, “Chaos based Zero-steganography algorithm,” Multimedia Tools and Applications, vol. 72, no. 2, pp. 1073–1092, 2014. View at Publisher · View at Google Scholar · View at Scopus
  8. M. Bilal, S. Imtiaz, W. Abdul et al., “Zero-steganography using DCT and spatial domain,” in Proceedings of the ACS International Conference on Computer Systems and Applications (AICCSA '13), pp. 1–7, IEEE, Ifrane, Morocco, May 2013. View at Publisher · View at Google Scholar · View at Scopus
  9. H. Ishizuka, I. Echizen, K. Iwamura et al., “A zero-watermarking-like steganography and potential applications,” in Proceedings of the 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP '14), pp. 459–462, IEEE, Kitakyushu, Japan, August 2014. View at Publisher · View at Google Scholar · View at Scopus
  10. H. Ishizuka, I. Echizen, K. Iwamura et al., “Evaluation of a Zero-Watermarking-Type Steganography,” in Digital-Forensics and Watermarking, pp. 613–624, Springer International Publishing, Berlin, Germany, 2014. View at Publisher · View at Google Scholar · View at Scopus
  11. D.-Z. Yang et al., “Application of WebCrawler in information search and data mining,” Computer Engineering and Design, vol. 30, pp. 5658–5662, 2009. View at Google Scholar
  12. W.-P. Liu et al., “A fractal feature based method for image classification,” Journal of Image and Graphics, vol. 10, pp. 754–757, 2005. View at Google Scholar
  13. C. Berrou, A. Glavieux, and P. Thitimajshima, “Near Shannon limit error-correcting coding and encoding: turbo-codes,” in Proceedings of the IEEE International Conference on Communications, pp. 1064–1070, May 1993.
  14. C. Berrou and A. Glavieux, “Near optimum error correcting coding and decoding: turbo-codes,” IEEE Transactions on Communications, vol. 44, no. 10, pp. 1261–1271, 1996. View at Publisher · View at Google Scholar · View at Scopus
  15. H.-J. Zhang and C.-M. Zhu, “Novel LSB steganography algorithm of against statistical analysis,” Computer Engineering, vol. 34, no. 23, pp. 144–146, 2008. View at Google Scholar