1 |
C. Qin, C. C. Chang, Y. H. Huang and L. T. Liao, "An Inpainting Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism," IEEE Transactions on Circuits and Systems for Video Technology, vol. 23, pp. 1109-1118, Jul. 2013.
DOI
|
2 |
K. H. Jung and K. Y. Yoo, "Data Hiding Scheme in Binary Images Based on Block Masking for Key Authentication," Information Sciences, vol. 277, pp. 188-196, Sept. 2014.
DOI
|
3 |
A. Westfeld, "F5: A Steganographic Algorithm," Lecture Notes in Computer Science, vol. 2137, pp. 289-302, 2001.
|
4 |
J. Mielikainen, "LSB Matching Revisited," IEEE Signal Processing Letters, vol. 13, pp. 285-287, May 2006.
DOI
|
5 |
L. F. Turner, "Digital Data Security System," Patent IPN, WO 89/08915, available on Jan. 2019.
|
6 |
M.U. Celik, G. Sharma, A.M. Tekalp and E. Saber," Lossless generalized-LSB data embedding," IEEE Transactions on Image Processing, vol. 14, no. 2, pp. 253-266, Feb. 2005.
DOI
|
7 |
D. C. Wu and W. H. Tsai, "A steganographic method for images by pixel-value differencing," Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1613-1626, June 2003.
DOI
|
8 |
C. C. Chang, Y. Liu and T. S. Nguyen, "A Novel Turtle-shell Based Scheme for Data Hiding," in Proc. of Tenth Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing(IIHMSP'14), Kitakyushu, Japan, pp.89-93, 27-29 August 2014.
|
9 |
Y. C. Tseng, Y. Y. Chen and H. K. Pan, "A Secure Data Hiding Scheme for Binary Images," IEEE Transactions on Communications, vol. 50, pp. 1227-1231, Jul. 2002.
DOI
|
10 |
X. Zhang, S. Wang, "Efficient Steganographic Embedding by Exploiting Modification Direction," IEEE Communications Letters, vol. 10, no.11, pp.781-783, November 2006.
DOI
|
11 |
Y. Liu, C. C. Chang and T. S. Nguyen, "High Capacity Turtle-shell-based Data Hiding," IET Image Processing, vol. 10, pp.130-137, Feb. 2016.
DOI
|
12 |
D. J. Healy and O. R. Mitchell, "Digital Video Bandwidth Compression Using Block Truncation Coding," IEEE Transactions on Communications, vol. 29, pp.1809-1817, Dec 1981.
DOI
|
13 |
J. Ziv and A. Lempel, "A Universal Algorithm for Sequential Data Compression," IEEE Transactions on Information Theory, Volume 23, Issue 3, pp.337-343, May 1977.
DOI
|
14 |
D. Taubman, "High Performance Scalable Image Compression with EBCOT," IEEE Transactions on Image Processing, vol. 9, no. 7, pp.1158-1170, Jul 2000.
DOI
|
15 |
E. Delp and O. Mitchell, "Image Compression Using Block Truncation Coding," IEEE Transactions on Communications, vol. 27, no. 9, pp.1335-1342, 1979.
DOI
|
16 |
C. Qin, C. C. Chang and Y.P. Chiu, "A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting," IEEE Transactions on Image Processing, vol. 23, no. 3, pp. 969-978, March 2014.
DOI
|
17 |
C. M. Wang, N.I. Wu, C. S. Tsai and M. S. Hwang, "A high quality steganographic method with pixel-value differencing and modulus function," Journal of Systems and Software, vol. 81, no. 1, pp. 150-158, January 2008.
DOI
|
18 |
W. Luo, F. Huang and J. Huang, "A more secure steganography based on adaptive pixel-value differencing scheme," Multimedia Tools and Applications, vol. 52, no. 2-3, pp 407-430, April 2011.
DOI
|
19 |
M. Lema and O. Mitchell, "Absolute Moment Block Truncation Coding and Its Application to Color Images," IEEE Transactions on Communications, vol. 32, no. 10, pp.1148-1157, 1984.
DOI
|
20 |
S. S. Maniccam and N. Bourbakis, "Lossless Compression and Information Hiding in Images," Pattern Recognition, vol. 37, no. 3, pp. 475-486, March 2004.
DOI
|
21 |
C. C. Lin, X. L. Liu, W. L. Tai and S. M. Yuan, "A Novel Reversible Data Hiding Scheme Based on AMBTC Compression Technique," Multimedia Tools and Applications, vol. 74, no. 11, pp. 3823-3842, June 2015.
DOI
|
22 |
D. Ou and W. Sun, "High Payload Image Steganography with Minimum Distortion Based on Absolute Moment Block Truncation Coding," Multimedia Tools and Applications, vol. 74, no. 21, pp. 9117-9139, Nov. 2015.
DOI
|
23 |
Y. H. Huang, C. C. Chang and Y. H. Chen, "Hybrid secret hiding schemes based on absolute moment block truncation coding," Multimedia Tools and Applications, vol. 76, no. 5, pp. 6159-6174, March 2017.
DOI
|
24 |
A. Malik, G. Sikka and H. K. Verma, "A High Payload Data Hiding Scheme Based on Modified AMBTC technique," Multimedia Tools and Applications, vol. 76, no. 12, pp. 14151-14167, June 2017.
DOI
|
25 |
R. Kumar, D. S. Kim, K. H. Jung, "Enhanced AMBTC based data hiding method using hamming distance and pixel value differencing," Journal of Information Security and Applications, vol. 47, pp. 94-103, August 2019.
DOI
|