1 |
H. Kim, "Theoretical Background and Detection Technique of Steganography," Journal of the Korea Information Security, Vol. 12, No. 1, pp. 34-47, 2002.
|
2 |
S. Ji, "A Study of Optimal Image Steganography Based on LSB Techniques," Journal of the Korea Industrial Information Systems Research, Vol. 20, No. 3, pp. 29-36, 2015.
DOI
|
3 |
D. C. Wu and W. H. T, "A Steganographic Method for Images by Pixel-Value Differencing," Pattern Recognition Letters, Vol. 24, pp. 1613-1626, 2003.
DOI
|
4 |
K. C. Chang, C. P. Chang, P. S. Huang, and T. M. Tu, "A Novel Image Steganographic Method using Tri-way Pixel-Value Differencing," Journal of Multimedia, Vol. 3, No. 2, pp. 37-44, 2008.
|
5 |
J. Kim and H. Park, "Image Steganography using Layered Pixel-Value Differencing," Proc. of SPIE, Tokyo, Japan, 2016.
|
6 |
Y. Lee, Y. Seo and D. Kim, "Hologram Watermarking using Fresnel Diffraction Model," Proc. of the Korea Society of Broadcast Engineers Conference, Vol 19, No. 5, pp. 606-615, 2014.
|
7 |
W. Sohn, and L. N. T. dung, "A Blind Watermarking Scheme using Singular Vector based on DWT/RDWT/SVD," Journal of Broadcast Engineering, Vol 21, No 2, 2016.
|
8 |
Y. Lee, Y. Seo, and D. Kim, "A Robust Blind Watermarking for Digital Image using DWT according to its Resolution," Journal of Broadcasting Engineering, Vol 20, No 6, pp 888-900, 2015.
DOI
|
9 |
S. Youssef, A. A. Elfarag, and R. Raouf, "A Robust Steganography Model using Wavelet-based Block-Partition Modification," International Journal of Computer Science & Information Technology, Vol 3, No 4, pp. 15-28, 2011.
DOI
|
10 |
S. Singh, and T. J. Siddiqui, "A Security Enhanced Robust Steganography Algorithm for Data Hiding," International Journal of Computer Science Issues, Vol 9, No 1, 2012.
|
11 |
C. Balasubramanian, S. Selvakumar, and S. Geetha, "High Payload image Steganography with Reduced Distortion using Octonary Pixel Pairing Scheme," Multimed Tools Appl, Vol. 73, pp. 2223-2245, 2014.
DOI
|