1 |
Tomas Filler, Jan Judas, Jessica Fridrich, “Minimizing Additive Distortion in Steganography using Syndrome-Trellis Codes,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 920-935, 2011. Article (CrossRef Link)
DOI
|
2 |
A. Westfeld, "F5-a steganographic algorithm: High capacity despite better steganalysis," in Proc. of Information Hiding, 4th International Workshop I. S, Moskowitz, Ed. New York, Springer-Verlag, vol. 2137, Lecture Notes Comput. Sci., pp. 289-302, 2001. Article (CrossRef Link)
|
3 |
J. Fridrich, and D. Soukal, “Matrix embedding for large payloads,” IEEE Trans. Inf. Security Forensics, vol. 1, no. 3, pp. 390–394, 2006. Article (CrossRef Link)
DOI
|
4 |
R.Y. Zhang, V. Sachnev, and H. J. Kim, "Fast BCH syndrome coding for steganography," in Proc. of Information Hiding, Darmstadt, Germany, pp. 48-58, 2009. Article (CrossRef Link)
|
5 |
V. Sachnev, and H. J. Kim, “Modified BCH data hiding scheme for JPEG steganography,” EURASIP Journal on Advances in Signal Processing, vol. 2012, no. 1, pp. 89-98, 2012.
DOI
|
6 |
H. Rifà-Pous, and J. Rifà, “Product perfect codes and steganography,” Digital Signal Processing, vol. 19, no 2009, pp. 764-769, 2009. Article (CrossRef Link)
DOI
|
7 |
R. Crandall, "Some Notes on Steganography," Posed on Steganography Mailing List, http://os.inf.tu-dresden.de/-westfeld/cranda ll.pdf, 1998. Article (CrossRef Link)
|
8 |
T. Pevn, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," in Proc. of Information Hiding, Lecture Notes in Computer Science, R. Bhme, P. Fong, and R. SafaviNaini, Eds. Springer Berlin / Heidelberg, pp. 161-177, 2010. Article (CrossRef Link)
|
9 |
V. Holub, J. Fridrich, "Digital Image Steganography Using Universal Distortion," in Proc. of 1st IH&MMSec Workshop, Montpellier, France, pp.59-68, June 17-19, 2013. Article (CrossRef Link)
|
10 |
J. Rifà and L. Ronquillo, "Product Perfect ℤ2ℤ4-linear codes in Steganography," in Proc. of International Symposium on Information Theory and its Applications (ISITA), Taiwan, pp. 696-701, 2010. Article (CrossRef Link)
|
11 |
Z. Zhao and F. Gao, "An improved steganographic method of product perfect codes," in Proc. of Signal Processing, Communication and Computing (ICSPCC), Xian, pp. 1-5, 2011. Article (CrossRef Link)
|
12 |
T. Denemark and J. Fridrich, "Improving Steganographic Security by Synchronizing the Selection Channel," in Proc. of 3rd IH&MMSec. Workshop, Portland, Oregon, pp. 5-14, 2015. Article (CrossRef Link)
|
13 |
Zuyun Fu, Information Theory, Publishing House of Electronics Industry, China, 2007.
|
14 |
X. Zhang and S. Wang, “Efficient Steganographic Embedding by Exploiting Modification Direction,” IEEE Communications Letters, vol. 10, no. 11, pp. 781-783, 2006. Article (CrossRef Link)
DOI
|
15 |
W. M. Zhang, X. P. Zhang and S. Z. Wang, “A Double Layered “Plus-Minus One Data Embedding Scheme,” IEEE Signal Processing Letters, vol. 14, no. 11, pp.848-851, 2007. Article (CrossRef Link)
DOI
|
16 |
J. Fridrich, M. Goljan, P. Lisonek, D. Soukal, “Writing on wet paper,” IEEE Trans. Signal Process, vol. 53, no. 10, pp. 3923-3953, 2005. Article (CrossRef Link)
DOI
|
17 |
Pevny T, Bas P, Fridrich J, “Steganalysis by subtractive pixel adjacency matrix,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp.215-224, 2010. Article (CrossRef Link)
DOI
|
18 |
C. Qin, C. C. Chang and T. J. Hsu, “Reversible Data Hiding Scheme Based on Exploiting Modification Direction with Two Steganographic Images,” Multimedia Tools and Applications, vol. 74, no. 15, pp. 5861-5872, 2015. Article (CrossRef Link)
DOI
|
19 |
Xinpeng Zhang and Shouzhong Wang, “Dynamical Running Coding in Digital Steganography,” IEEE Signal Processing Letters, vol. 13, no. 3, pp. 165-168, 2006. Article (CrossRef Link)
DOI
|
20 |
C. Qin, C. C. Chang, Y. H. Huang, and L. T. Liao, “An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 23, no. 7, pp.1109-1118, 2013. Article (CrossRef Link)
DOI
|
21 |
Zhou Peng, Nadeem T, Kang P, et al, "EZCab: A cab booking application using short-range wireless communication," in Proc of IEEE Int Conf Pervasive Computing and Communications (PerCom), Piscataway, NJ:IEEE, pp.27-38, 2015. Article (CrossRef Link)
|
22 |
Li Chuan, Hutchins D A, Green R J, “Short-range ultrasonic digital communications in air,” IEEE Trans on Ultrasonic, Ferroelectrics and Frequency Control, vol. 55, no. 4, pp. 908-918, 2008. Article (CrossRef Link)
DOI
|
23 |
T. Filler, A. Ker and J. Fridrich, "The square root law of steganographic capacity for markov covers," in Proc. of Media Forensics and security XI, pp. 801-811, 2009. Article (CrossRef Link)
|
24 |
Lingyu Zhang, Diao Chen, Yun Cao and Xianfeng Zhao, "A Practical Method to Determine Achievable Rates for Secure Steganography," in Proc. of 17th IEEE International Symposium on Cyberspace Safety and Security (CSS), NewYork, USA, pp.1274-1281, 2015. Article (CrossRef Link)
|