References
- W. Bender, D. Gruhl, N. Morimoto, and Aiguo Lu, "Techniques for Data Hiding,"IBM Systems Journal, Vol. 35, No. 3-4, pp. 313-336, 1996. https://doi.org/10.1147/sj.353.0313
- N.F. Johnson and S. Jajodia, "Exploring Steganography: Seeing the Unseen,"Computer Practices, Vol. 31, No. 2, pp. 26-34, 1998.
- F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, "Information Hiding - A Survey, "Proceedings of the IEEE, Special Issue on P rotection of Multimedia Content, Vol. 7, No. 87, pp. 1062-1078, 1999.
- X. Zhang and S. Wang, "Efficient Steganographic Embedding by Exploiting Modification Direction,"IEEE Communications Letters, Vol. 10, No. 11, pp. 781-783, 2006. https://doi.org/10.1109/LCOMM.2006.060863
- A. Ker, "Improved Detection of LSB Steganography in Grayscale Images,"Proceeding of Information Hiding Workshop, Vol. 3200, pp. 97-115, 2004.
- D.C. Wu and W.H. Tsai, "A Steganographic Method for Images by Pixel-Value Differencing,"Pattern Recognition Letters, Vol. 24, pp. 1613-1626, 2003. https://doi.org/10.1016/S0167-8655(02)00402-6
- Z. Ni, Y. Shi, N. Ansari, and W. Su, "Reversible Data Hiding,"IEEE Transaction on Circuits and Systems for Video Technology, Vol. 16, No. 3, pp. 354-362, 2006. https://doi.org/10.1109/TCSVT.2006.869964
- X. Li, J. Li, B. Li, and B. Yang, "High-Fidelity Reversible Data Hiding Scheme based on Pixel-Value-Ordering and Prediction-Error Expansion,"Signal Processing, Vol. 93, pp. 198-205, 2013. https://doi.org/10.1016/j.sigpro.2012.07.025
- C. Chang, T. Kieu, and Y. Chou, "Reversible Data Hiding Scheme Using Two Steganographic Images,"Proceeding of IEEE Region 10 International Conference, pp. 1-4, 2007.
- C. Lee, K. Wang, C. Chang, and Y. Huang, "A Reversible Data Hiding Scheme based on Dual Steganographic Images,"Proceeding of the Third International Conference on Ubiquitous Information Management and Communication, pp. 228-237, 2009.
- C. Qin, C. Chang, and T. Hsu, "Reversible Data Hiding Scheme based on Exploiting Modification Direction with Two Steganographic Images,"Multimedia Tools and Application, Vol. 74, No. 15, pp. 5861-5872, 2015. https://doi.org/10.1007/s11042-014-1894-5
- T. Lu, J. Wu, and C. Huang, "Dual-ImageBased Reversible Data Hiding Method Using Center Folding Starategy,"Signal Processing, Vol. 115, pp. 195-213, 2015. https://doi.org/10.1016/j.sigpro.2015.03.017
- X.F. Chen and W.L. Guo, "Reversible Data Hiding Scheme Based on Fully Exploiting the Orientation Combinations of Dual Stego-Images,"International Journal of Network Security, Vol. 22, No. 1, pp. 126-135, 2019.
- J.Y. Lin, Y. Chen, C.C. Chang, and Y.C. Hu, "Dual-Image-Based Reversible Data Hiding Scheme with Integrity Verification Using Exploiting Modification Direction,"Multimedia Tools and Applications, Vol 78, pp. 25855-25872, 2019. https://doi.org/10.1007/s11042-019-07783-y
- X. Chen and C. Hong, "An Efficient DualImage Reversible Data Hiding Scheme Based on Exploiting Modification Direction,"Journal of Information Security and Applications, Vol. 58, pp. 1-9, 2021.
- Y.J. Kim, P.H. Kim, and K.Y. Yoo, "A Reversible Data Hiding Scheme Using 7×7 Sudoku Based on Secret Sharing,"Journal of Korea Multimedia Society, Vol. 20, No. 2, pp. 261-270, 2017. https://doi.org/10.9717/KMMS.2017.20.2.261
- A. Shamir, "How to Share a Secret," Communications of the ACM, Vol. 22, No. 11, pp. 612-613, 1979. https://doi.org/10.1145/359168.359176
- B. Boehm, "StegExpose - A Tool for Detecting LSB Steganography," Computer Science, pp. 1-11, 2014