1 |
K.H. Jung, J.H. Lee, K.Y. Yoo, "Steganography on android smart devices", Journal of The Institute of Electronics and Information Engineers 52(4), pp. 99-105, 2015.
DOI
|
2 |
W.J. Kim, P.H. Kim, J.H. Lee, K.H. Jung, K.Y. Yoo, "Reversible data hiding method based on min/max in 2x2 sub-blocks", Journal of The Institute of Electronics and Information Engineers 51(4), pp.745-751, 2014.
|
3 |
J. Tian, "Reversible data embedding using a difference expansion", IEEE Transactions on Circuits and Systems for Video Technology 13(8), pp. 890-896, 2003.
DOI
ScienceOn
|
4 |
K.H. Jung, I.T, Kim, J.C. Kim, "Steganographic method based on three directional embedding", The Korea Institute of Military Science and Technology 13(2), pp. 268-274, 2010.
|
5 |
K.H. Jung, K.Y. Yoo, "Data hiding method in binary images based on block masking for key authentication", Information Sciences 277(1), pp. 188-196, 2014.
DOI
ScienceOn
|
6 |
J. Mielikainen, "LSB matching revisited", IEEE Signal Processing Letters 13, pp. 285-287, 2006.
DOI
ScienceOn
|
7 |
D.C. Wu, W.H. Tsai, "A steganographic method for images by pixel-value differencing", Pattern Regcognition Letters 24, pp. 1613-1626, 2003.
DOI
ScienceOn
|
8 |
H.C. Wu, N.I. Wu, C.S. Tsai, M.S. Hwang, "Image steganographic scheme based on pixel-value differencing and LSB replacement methods", IEE Processing Visualization, Image Signal Process 152, pp. 611-615, 2005.
DOI
ScienceOn
|
9 |
X. Li, J. Li, B. Li, B. Yang, "High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion", Signal Processing 93, pp. 198-205, 2013.
DOI
ScienceOn
|
10 |
A. Khan, A. Siddiqa, S. Munib, S.A. Malik, A recent survey of reversible watermarking techniques, Information Sciences 279, pp. 252-272, 2014.
|
11 |
M.S. Subhedar, V.H. Mankar, Current status and key issues in image steganography: a survey, Computer Science Review 13(14), pp. 95-113, 2014.
|
12 |
A. Cheddad, J. Condell, K. Curran, P.M. Kevitt, Digital image steganography: survey and analysis of current methods, Signal Processing 90, pp. 727-752, 2010.
DOI
ScienceOn
|
13 |
A. Nissar, A.H. Mir, Classification of steganalysis techniques: a study, Digital Signal Processing 20, pp. 1758-1770, 2010.
DOI
ScienceOn
|
14 |
J. Zollner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, "Modeling the Security of Steganographic Systems," 2nd Workshop on Information Hiding, pp. 345-355, 1998
|
15 |
KISTI Emulab, http://www.emulab.kreonet.net
|
16 |
Emulab, http://www.emulab.net/
|
17 |
M.H. Le, W.J. Seok, "Research on the trend of utilizing Emulab as cyber security research framework", Journal of The Korea Institute of Information Security & Cryptology 23(6), pp. 1169-1180, 2013.
DOI
ScienceOn
|
18 |
K.H. Jung, K.Y. Yoo, "High-capacity index based data hiding method", Multimedia Tools and Applications 74(6), pp. 2179-2193, 2015.
DOI
ScienceOn
|
19 |
K.H. Jung, "Image steganographic method using variable length for data embedding", The Korea Institute of Military Science and Technology 11(32), pp. 115-122, 2008.
|