1 |
J. C. Cheng, W. C. Kuo, and B. R. Su, "Data-hiding based on sudoku and generalized exploiting modification direction," Journal of Electronic Science Technology, vol. 16, no. 2, pp. 123-128, 2018.
|
2 |
W. C. Kuo, C. C. Wang, and Y. C. Huang, "Binary power data hiding scheme," AEU - International Journal of Electronics and Communications, vol. 69, no. 11, pp. 1574-1581, 2015.
DOI
|
3 |
C. K. Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognittion, vol. 37, no. 3, pp. 469-474, 2004.
DOI
|
4 |
C. F. Lee, Y. R. Wang, and C. C. Chang, "A steganographic method with high embedding capacity by improving exploiting modification direction," in Proc. of the 3 rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP), vol. 1, pp. 497-500, 2007.
|
5 |
C. H. Yang, "Inverted pattern approach to improve image quality of information hiding by LSB substitution," Pattern Recognition, vol. 41, no. 8, pp. 2674-2683, 2008.
DOI
|
6 |
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding - a survey," Proceedings of IEEE, vol. 87, no. 7, pp. 1062-1078, 1999.
DOI
|
7 |
S. Y. Shen and L. H. Huang, "A data hiding scheme using pixel value differencing and improving exploiting modification directions," Computers and Securrity, vol. 48, pp. 131-141, 2015.
DOI
|
8 |
J. Mielikainen, "LSB matching revisited," IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, 2006.
DOI
|
9 |
C. C. Chang, M. H. Lin, and Y. C. Hu, "A fast and secure image hiding scheme based on LSB substitution," International Journal Pattern Recognition and Artificial Intelligence, vol. 16, no. 4, pp. 399-416, 2002.
DOI
|
10 |
Y. Y. Tsai, C. S. Chan, C. L. Liu, and B. R. Su, "A reversible steganographic algorithm for BTCcompressed images based on difference expansion and median edge detector," Imaging Science Journal, vol. 62, no. 1, pp. 48-55, 2014.
DOI
|
11 |
X. Zhang and S. Wang, "Efficient steganographic embedding by exploiting modification direction," IEEE Communications Letters, vol. 10, no. 11, pp. 781-783, 2006.
DOI
|
12 |
H. J. Kim, C. Kim, Y. Choi, S. Wang, and X. Zhang, "Improved modification direction methods," Computers and Mathematics with Applications, vol. 60, no. 2, pp. 319-325, 2010.
DOI
|
13 |
W. C. Kuo, "Secure modulus data hiding scheme," KSII Transactions on Internet Information Systems, vol. 7, no. 3, pp. 610-622, 2013.
|
14 |
W. Hong and T. S. Chen, "A novel data embedding method using adaptive pixel pair matching," IEEE Transactions on Information Forensics Security, vol. 7, no. 1, pp. 176-184, 2012.
DOI
|
15 |
K. Jung and K. Y. Yoo, "Improved Exploiting Modification Direction Method by Modulus Operation," International Journal of Signal Processing, Image Processing and Pattern Recognition, vol. 2, no. 1, pp. 79-88, 2009.
|
16 |
T. D. Sairam and K. Boopathybagan, "An improved high capacity data hiding scheme using pixel value adjustment and modulus operation," Multimedia Tools Applications, vol. 79, pp. 17003-17013, 2019.
DOI
|
17 |
Y. Zhang, S. Wang, T. Li, B. Liu, and D. B. Pan, "Modulus Calculations on Prime Number Algorithm for Information Hiding with High Comprehensive Performance," IEEE Access, vol. 8, pp. 85309-85320, 2020.
DOI
|
18 |
W. C. Kuo, S. H. Kuo, C. C. Wang, and L. C. Wuu, "High capacity data hiding scheme based on multi-bit encoding function," Optik (Stuttg), vol. 127, no. 4, pp. 1762-1769, 2016.
DOI
|
19 |
K. H. Jung, J. G. Yu, S. M. Kim, K. J. Kim, J. Y. Byun, and K. Y. Yoo, "The hiding of secret data using the run length matching method," in Proc. of KES International Symposium on Agent and Multi-Agent Systmes: Technologies and Applications, vol. 4496, pp. 1027-1034, 2007.
|
20 |
W. C. Kuo, C. C. Wang, and H. C. Hou, "Signed digit data hiding scheme," Information Processing Letters, vol. 116, no. 2, pp. 183-191, 2016.
DOI
|
21 |
USC-SIPI image database.
|