1 |
J. Zollner, H. Federrath, H. Klimant, A. Pfitzmann, R Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, "Modeling the Security of Steganographic Systems," Proc. of Workshop on Information Hiding, pp. 345-355, 1988.
|
2 |
H. Kim, "Theoretical Background and Detection Technique of Steganography," Journal of the Korea Information Security, Vol. 12, No. 1, pp. 34-47, 2002.
|
3 |
K. Jung, J. Lee, and K. Yoo, "Steganography on Android Smart Devices," Journal of the Institute of Electronics and Information Engineers, Vol. 52, No. 4, pp. 100-105, 2015.
DOI
|
4 |
D. C. Wu and W. H. T, "A Steganographic Method for Images by Pixel-Value Differencing," Pattern Recognition Letters, Vol. 24, pp. 1613-1626, 2003.
DOI
|
5 |
J. Kim, H. Park, and J-I. Park, "PVD Image Steganography with Locally-fixed Number of Embedding Bits," Journal of Broadcast Engineering, Vol. 22, No. 3, pp. 350-365, 2017.
DOI
|
6 |
S. Ji, "A Study of Optimal Image Steganography Based on LSB Techniques," Journal of the Korea Industrial Information Systems Research, Vol. 20, No. 3, pp. 29-36, 2015.
DOI
|
7 |
Y. Lee, Y. Seo, and D. Kim, "Hologram Watermarking using Fresnel Diffraction Model," Proc. of the Korea Society of Broadcast Engineers Conference, Vol. 19, No. 5, pp. 606-615, 2014.
|
8 |
W. Sohn and L. N. T. dung, "A Blind Watermarking Scheme using Singular Vector Based on DWT/RDWT/SVD," Journal of Broadcast Engineering, Vol. 21, No. 2, pp. 149-156, 2016.
DOI
|
9 |
Y. Lee, Y. Seo, and D. Kim, "A Robust Blind Watermarking for Digital Image using DWT According to Its Resolution," Journal of Broadcast Engineering, Vol. 20, No. 6, pp. 888-900, 2015.
DOI
|
10 |
S. Youssef, A. A. elfarag, and R. Raouf, "A Robust Steganography Model using Wavelet-based Block-partition Modification," International Journal of Computer Science & Information Technology, Vol. 3, No. 4, pp. 15-28, 2011.
DOI
|
11 |
T. Kanungo, D. Mount, N. Netanyahu, C. Piako, R. Silverman, and A. Wu, "An Efficient -means Clustering Algorithm: Analysis and Implementation," IEEE Trans. Pattern Anal. Mach. Intell., Vol. 24, No. 7, pp. 881-892, 2000.
|
12 |
S. Singh and T. J. Siddiqui, "A Security Enhanced Robust Steganography Algorithm for Data Hiding," International Journal of Computer Science Issues, Vol. 9, No. 1, pp. 131-139, 2012.
|
13 |
J. Kim, H. Park, and J-I. Park, "Image Steganography Based on Block Matching in DWT Domain," Proc. of BMSB, Cagliary, Italy, 2017.
|