References
- Neil F. Johnson, Sushil Jajodia, Exploring Steganography : Seeing the Unseen, Computer Practices, 26-34, 1998
- J. Zollner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, G. Wolf, Modeling the security of steganographic systems, 2nd Workshop on Information Hiding, 345-355, 1998
- W. Bender, N. Morimoto, A. Lu, Techniques for data hiding, IBM Systems Journal, 35(3/4), 313-336, 1996 https://doi.org/10.1147/sj.353.0313
- D. C. Wu, W. H. Tsai, A steganographic method for images by pixel-differencing, Pattern Recognition Letters 24(9-10), 1613-1626, 2003 https://doi.org/10.1016/S0167-8655(02)00402-6
- C. C. Chang, H. W. Tseng, A steganographic method for digital images using side-match, Pattern Recognition Letters 25(12), 1431-1437, 2004 https://doi.org/10.1016/j.patrec.2004.05.006
- R. C. Gonzalez, R. E. Woods, Digital Image Processing, Prentice Hall, Upper Saddle River, NJ, 2002
- R. J. Anderson, F. A. P. Petitcolas, On the limits of steganography, IEEE Journal on Selected Areas in Communications 16, 474-481, 1998 https://doi.org/10.1109/49.668971
- F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn, Information hiding - a survey, Proceedings of the IEEE, special issue on protection of multimedia content, 87(7), 1062-1078, 1999
- K. H. Jung, J. G. Yu, S. M. Kim, K. J. Kim, J. Y. Byun, K. Y. Yoo, The hiding of secret data using the run length matching method, LNCS, 1027-1034, 2007
- Z. Wang, A. C. Bovik, A universal image quality index, IEEE Signal Processing Letters 9, 81-84, 2002 https://doi.org/10.1109/97.995823