References
- A. Khan, A. Siddiqa, S. Munib, S.A. Malik, A recent survey of reversible watermarking techniques, Information Sciences 279, pp. 252-272, 2014.
- M.S. Subhedar, V.H. Mankar, Current status and key issues in image steganography: a survey, Computer Science Review 13(14), pp. 95-113, 2014.
- A. Cheddad, J. Condell, K. Curran, P.M. Kevitt, Digital image steganography: survey and analysis of current methods, Signal Processing 90, pp. 727-752, 2010. https://doi.org/10.1016/j.sigpro.2009.08.010
- A. Nissar, A.H. Mir, Classification of steganalysis techniques: a study, Digital Signal Processing 20, pp. 1758-1770, 2010. https://doi.org/10.1016/j.dsp.2010.02.003
- J. Zollner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, "Modeling the Security of Steganographic Systems," 2nd Workshop on Information Hiding, pp. 345-355, 1998
- KISTI Emulab, http://www.emulab.kreonet.net
- Emulab, http://www.emulab.net/
- M.H. Le, W.J. Seok, "Research on the trend of utilizing Emulab as cyber security research framework", Journal of The Korea Institute of Information Security & Cryptology 23(6), pp. 1169-1180, 2013. https://doi.org/10.13089/JKIISC.2013.23.6.1169
- K.H. Jung, J.H. Lee, K.Y. Yoo, "Steganography on android smart devices", Journal of The Institute of Electronics and Information Engineers 52(4), pp. 99-105, 2015. https://doi.org/10.5573/ieie.2015.52.4.099
- W.J. Kim, P.H. Kim, J.H. Lee, K.H. Jung, K.Y. Yoo, "Reversible data hiding method based on min/max in 2x2 sub-blocks", Journal of The Institute of Electronics and Information Engineers 51(4), pp.745-751, 2014.
- K.H. Jung, K.Y. Yoo, "High-capacity index based data hiding method", Multimedia Tools and Applications 74(6), pp. 2179-2193, 2015. https://doi.org/10.1007/s11042-014-2081-4
- J. Tian, "Reversible data embedding using a difference expansion", IEEE Transactions on Circuits and Systems for Video Technology 13(8), pp. 890-896, 2003. https://doi.org/10.1109/TCSVT.2003.815962
- K.H. Jung, "Image steganographic method using variable length for data embedding", The Korea Institute of Military Science and Technology 11(32), pp. 115-122, 2008.
- K.H. Jung, I.T, Kim, J.C. Kim, "Steganographic method based on three directional embedding", The Korea Institute of Military Science and Technology 13(2), pp. 268-274, 2010.
- K.H. Jung, K.Y. Yoo, "Data hiding method in binary images based on block masking for key authentication", Information Sciences 277(1), pp. 188-196, 2014. https://doi.org/10.1016/j.ins.2014.02.016
- J. Mielikainen, "LSB matching revisited", IEEE Signal Processing Letters 13, pp. 285-287, 2006. https://doi.org/10.1109/LSP.2006.870357
- D.C. Wu, W.H. Tsai, "A steganographic method for images by pixel-value differencing", Pattern Regcognition Letters 24, pp. 1613-1626, 2003. https://doi.org/10.1016/S0167-8655(02)00402-6
- H.C. Wu, N.I. Wu, C.S. Tsai, M.S. Hwang, "Image steganographic scheme based on pixel-value differencing and LSB replacement methods", IEE Processing Visualization, Image Signal Process 152, pp. 611-615, 2005. https://doi.org/10.1049/ip-vis:20059022
- X. Li, J. Li, B. Li, B. Yang, "High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion", Signal Processing 93, pp. 198-205, 2013. https://doi.org/10.1016/j.sigpro.2012.07.025