1 |
X. T. Wang, C. C. Chang, C. C. Lin, M. C. Li, "A novel multi-group exploiting modification direction method based on switch map," Signal Processing, Vol.92, No.6, pp.1525-1535, 2012.
DOI
ScienceOn
|
2 |
F. M. J. Willems and M. Dijk, "Capacity and codes for embedding information in gray-scale signals," IEEE Trans. On Information Theory, Vol.51, No.3, pp.1209-1214, 2005.
DOI
ScienceOn
|
3 |
X. Zhang and S. Wang, "Efficient steganogrraphic embedding by exploiting modification," IEEE Communications Letters, Vol.10, No.11, pp.781-783, 2006.
DOI
ScienceOn
|
4 |
C. S. Kim, D. K. Shin, D. G. Shin and X. P. Zhang, "Im roved steganographic embedding exploiting modification direction in multimedia communications," Springer, CCIS 186, pp.130-138, 2011.
|
5 |
W. C. Kuo, and C. C. Wang, "Data hiding based on generalized exploiting modification direction method," Imaging Science Journal, http://dx.doi.org/ 10.1179 /1743131X12Y.0000000011, 2012.
|
6 |
W. C. Kuo, L. C. Wuu, C. N. Shyi, and S. H. Kuo, "A data hiding scheme with high embedding capacity based on general improving exploiting modification direction method," in Proc. of the Ninth International Conference on Hybrid Intelligent Systems(HIS2009), pp.69-73, 2009.
|
7 |
W. C. Kuo, L. C. Wuu, and S. H. Kuo, "The high embedding steganographic method based on general multi-EMD," in Proc. of the 2012 International Conference on Information Security and Intelligent Control (ISIC' , pp.286-289, 2012.
|
8 |
X. Liao, Q. Y. Wen, J. Zhang, "A steganographic method for digita images with four-pixe differencing and modified LSB substitution," Journal of Visual Communication and Image Representation, Vol.22, No.1, pp.1-8, 2011.
DOI
ScienceOn
|
9 |
C. F. Lee, Y. R. Wang and C. C. Chang, "A steganographic method with high embedding capacity by improving exploiting modification direction," in Proc. of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIHMSP07), Vol.1 , pp.497-500 , 2007.
|
10 |
C. F. Lee, C. C. Chang and K. H. Wang, "An improvement of EMD embedding method for large payloads by pixel segmentation strateg ," Image and Vision Computing, Vol 26, No.12, pp.1670-1676, 2008.
DOI
ScienceOn
|
11 |
K. Y. Lin, W. Hong, J. Chen, T. S. Chen and W. C. Chiang, "Data hiding by exploiting modification direction technique using optimal pixel grouping," in Proc. of the 2nd International Conference on Education Technology and Computer (ICETC2010), Vol.3, pp.121-123, 2010.
|
12 |
J. Mielikainen, "LSB matching revisited," IEEE Signal Processing Letters, Vol.13, No.5, pp.285-287, 2006.
DOI
ScienceOn
|
13 |
F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, "Information hiding-a survey," Proceedings of the IEEE, Vol.87, No.7, pp.1062-1078, 1999.
DOI
ScienceOn
|
14 |
R. L. Rivest, A. Shamir and L. Adleman, "A method or obtaining digita signatures and public-key cryptosystems," Communications of the ACM, Vol.21, No.2, pp.120-126, 1978.
DOI
ScienceOn
|
15 |
T. Sharp, "An implementation of key-based digita signa steganography," in Proc. of the 4th international workshop on information hiding. Springer, LNCS 2137, pp.13-26, 2001.
|
16 |
D. Stinson, Cryptography: Theory and Practice, CRC Press, 1995.
|
17 |
L. F. Turner, "Digita data security system," Patent IPN, WO 89/08915, 1989.
|
18 |
C. S. Chan, Y. Y. Tsai, and C. L. Liu, "An image hiding scheme by linking pixels in the circular Wa ," KSII Trans. On Internet and Information Systems, Vol.6, No.6, pp.1718-1734, 2012.
|
19 |
J. Fridrich, M. Goljan, and R. Du, "Detecting steganography in color and gray scale images, " IEEE Multimedia, Vol.8, No.4, pp.22-28, 2001.
|