References
- N.F. Johnson and S. Jajodia, "Exploring Steganography : Seeing the Unseen," Computer Practices, Vol.31, No.2, pp. 26-34, 1998.
- R.J. Anderson and F.A.P. Petitcolas, "On the Limits of Steganography," IEEE Journal on Selected Areas in Communications, Vol.16, No.4, pp. 474-481, 1998. https://doi.org/10.1109/49.668971
- N. Johnson and S. Jajodia, "Steganalysis of Images Created using Current Steganography Software," Second Information Hiding Workshop held in Portland, Oregon, USA, LNCS 1525, pp. 273-289, 1998. https://doi.org/10.1007/3-540-49380-8_19
- S. Katzenbeisser and F.A.P. Peticolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Books, London, 2000.
- E. Kawaguchi, H. Noda, and M. Niimi, "Image Data Based Steganograpy," Information Processing Society of Japan(IPSJ MAGAZINE), Vol.44, No.3, pp. 236-241, 2003.
- J. Zollner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, "Modeling the Security of Steganographic Systems," Proceedings of 2nd Workshop on Information Hiding, pp. 345-355, 1998.
- Z. Ni, Y.Q. Shi, N. Ansari, and W. Su, "Reversible Data Hiding," Proceedings of International Symposiumon Circuits and Systems, Vol.2, pp. 912-915, 2003.
- K. Nozaki, M. Maeda, K. Tsuda, and E. Kawaguchi, "A Model of Anonymous Covert Internet Mailing System using Steganograpy," Proceedings of Pacific Rim Workshop on Digital Steganograpy (STEG 2002) , pp. 7-10, 2002.
- H. Noda, J. Spaulding, M.N. Shirazi, M. Nimi, and E. Kawaguchi, "BPCS Steganograpy Combined with JPEG2000 Compreasion," Proceedings of Pacific Rim Workshop on Digital Steganograpy (STEG 2002), pp. 98- 107, 2002.
- C. Cox, J. Killian, T. Leighton, and T. Shamoon, Secure Spread Spectrum Communication for Multimedia, Technical Report, N.E.C. Research Institute, 1995.
- M. Swanson, M. Kobayashi, and A. Tewfik, "Multimedia Data Embedding and Watermarking Technologies," Proceedings of IEEE, Vol.86, No.6, pp. 1064-1087, 1998.
- F. Hartung and M. Kutter, "Multimedia Watermarking Techniques," Proceedings of IEEE, Vol.86, No.6, pp. 1079-1107, 1998.
- G.W. Braudaway, K. A. Magerlein, and F. Mintzer, "Protecting Publicly-available Images with a Visible Image Watermark," Proceedings of the SPIE International Conference on Electronic Imaging, Vol.2659, pp. 126-133, 1996.
- T. Kalker, Watermark Estimation Through Detector Observation, Philips Research Eindhoven, Netherland, preprint, 1998.
- J.P.M.G. Linnartz, A.C.C. Kalker, G.F. Depovere, and R. Beuker, "A Reliability Model for Detection of Electronic Watermarks in Digital Images," Proceedings of Benelux Symposiumon Communication Theory, pp. 202-208, 1997.
- I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure Spread Spectrum Watermarking for Images, Audio and Video," Proceedings of International Conference on Image Processing( ICIP96) , pp. 243-246, 1996.
- B. Macq, "Lossless Multi-Resolution Transform for Image Authenticating Watermarking," Proceedings of EUSIPCO, 2000.
- C.K. Chan and L.M. Cheng. "Hiding Data in Images by Simple LSB Substitution," Journal of Pattern Recognition, Vol.37, No.3, pp.469-474, 2004. https://doi.org/10.1016/j.patcog.2003.08.007
- R.Z. Wang, C.F. Lin, and J.C. Lin. "Image Hiding by Optimal LSB Substitution and Genetic Algorithm," Journal of Pattern Recognition, Vol.34, No.3, pp. 671-683, 2001. https://doi.org/10.1016/S0031-3203(00)00015-7
- D.C. Wu and W.H. Tsai. "A Steganographic Method for Images by Pixel-Value Differencing," Journal of Pattern Recognition Letters, Vol.24, No.9-10, pp. 1613-1626, 2003. https://doi.org/10.1016/S0167-8655(02)00402-6
- C.M. Wang, N.I. Wu, C.S. Tsai, and M.S. Hwang. "A High Quality Steganographic Method with Pixel-value Differencing and Modulus Function," Journal of Systems and Software, Vol.81, No.1, pp. 150-158, 2008. https://doi.org/10.1016/j.jss.2007.01.049
- H.C. Wu, N.I. Wu, C.S. Tsai, and M.S. Hwang. "Image Steganographic Scheme based on Pixel-value Differencing and LSB replacement Methods," Visual Image Signal Processing, Vol.152, No.5, pp. 611-615, 2005. https://doi.org/10.1049/ip-vis:20059022
- David A. Huffman, "A Method for the Construction of Minimum-Redundancy Codes," Proceedings of the I.R.E., pp. 1098-1101, 1951.
- Y.R Park and J.H Park, "A Study of Steganograhpy Using Cartoon Image," Journal of Korea Multimedia Society, Vol.7, No.7, pp.913-921, 2004.
Cited by
- Secret Image Sharing Scheme using Matrix Decomposition and Adversary Structure vol.17, pp.8, 2014, https://doi.org/10.9717/kmms.2014.17.8.953
- Reversible Secret Image Sharing Scheme Using Histogram Shifting and Difference Expansion vol.17, pp.7, 2014, https://doi.org/10.9717/kmms.2014.17.7.849