1 |
Yu, Y. H., C. C. Chang, and Y. C. Hu. "Hiding secret data in images via predictive coding", Pattern Recognition, vol.38, no.5, pp.691-705, 2005.
DOI
ScienceOn
|
2 |
Zhang, X. and S. Wang. "Efficient steganographic embedding by exploiting modification direction", IEEE Communications Letters, vol.10, no.11, pp.781-783, 2006.
DOI
ScienceOn
|
3 |
Chang, C.C., T.S. Chen, and L.Z. Chung. "A steganographic method based upon JPEG and quantization table modification", Information Sciences-Informatics and Computer Science, vol.141, no.1-2, pp.123-138, 2002.
|
4 |
김천식, 윤은준, 조민호, 홍유식, "의료영상을 위한 복원 가능한 정보 은닉 및 메시지 인증", 대한전자 공학회 논문지 CI편, 제 47권, 1호, pp.65-72, 2010.
|
5 |
Chang, C. -C., T. D. Kieu, and Y.-C. Chou. "A high payload steganographic scheme based on (7, 4) Hamming code for digital images", International Symposium on Electronic Commerce and Security, Guangzhou, China, pp.16-21, 2002.
|
6 |
Chao, R. M., H. C. Wu, C. -C. Lee, and Y.-P. Chu. "A novel image data hiding scheme with diamond encoding", EURASIP Journal on Information Security, vol. 2009, pp.1-9 (2009).
|
7 |
Fridrich, J., M. Goljan, and R. Du. "Detecting LSB steganography in color, and gray-scale images", IEEE Transactions on Multimedia, vol. 8, pp. 22-28, 2001.
|
8 |
Lee, C. F., C. C. Chang, and K. H. Wang. "Improvement of EMD embedding method for large payloads by pixel segmentation strategy", Image and Vision Computing, vol. 26, no. 12, pp. 1670-1676, 2008.
DOI
ScienceOn
|
9 |
Lin, P. L., C.-K. Hsieh, and P.-W. Huang, "A hierarchical digital watermarking method for image tamper detection and recovery", Pattern Recognition, vol. 38, no. 12, pp. 2519-2529, 2005.
DOI
ScienceOn
|
10 |
Provos, N. and P. Honeyman. "Hide and seek: An introduction to steganography", IEEE Security and Privacy, vol. 1, no. 3, pp. 32-44, 2003.
DOI
ScienceOn
|
11 |
Ni, Z., Y. Q. Shi, N. Ansari, W. Su, Q. Sun, and X. Lin. "Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication", IEEE transactions on circuits and systems for video technology, vol. 18, no.4, pp.497-509, 2008.
DOI
ScienceOn
|
12 |
Spaulding, J., H. Noda, M. N. Shirazi, and E. Kawaguchi. "BPCS steganography using EZW lossy compressed images", Pattern Recognition Letters, vol. 23, no. 13, pp. 1579-1587, 2002.
DOI
ScienceOn
|
13 |
Mielikainen, J. "LSB matching revisited", IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, 2006.
DOI
ScienceOn
|
14 |
Wang, H. and S. Wang. "Cyber warfare: Steganography vs. steganalysis," Communications of the ACM, vol. 47, no.10, pp.76-82, 2004.
|
15 |
Westfeld, A. "F5: A steganographic algorithm", Proceedings of the 4th International Workshop on Information Hiding 2001, Lecture Notes in Computer Science, vol. 2137, Pittsburgh, PA, USA, pp.289-302, 2004.
|
16 |
Bender W., D. Gruhl, N. Mormoto, A.Lu. "Techniques for data hiding", IBM systems journal, vol. 35, pp.313-336 (1996).
DOI
|
17 |
Hamming, R.W., "Error detecting and error correcting codes", Bell System Technical Journal, vol.29, no.2, pp.147-160, 1950.
DOI
|
18 |
Zhang, W., Wang, S., and Zhang, X., "Improve embedding efficiency of covering codes for applications in steganography", IEEE Communications Letters, vol.11, no.8, pp.680-682, 2007.
DOI
ScienceOn
|
19 |
University of Southern California. The USC-SIPI Image Database. Retrieved fro http://sipi.usc.edu/database/ on March 1, 2011.
|
20 |
Lin, W.H., Wang, Y.R., Horng, S.J., "A wavelet-tree-based watermarking method using distance vector of binary cluster", Expert Systems with Applications, vol.36, no.6, pp.9869-9878, 2009.
DOI
ScienceOn
|
21 |
Westfeld, A. "Attacks on steganographic systems", Proceedings of the 3rd Information Hiding Workshops, Dresden, Germany, September 28-October 1, pp.61-75, 1999.
|