1 |
Thien, C. C., Lin, J. C., A Simple and High-hiding Capacity Method for Hiding Digit-by-digit Data in Images Based on Modulus Function, Pattern Recognition 36, pp. 2876-2881, 2003.
|
2 |
Jung, K. H., Yoo, K. Y., Data Hiding Method using Image Interpolation, Computer Standards and Interfaces 31, pp. 465-470, 2009.
DOI
ScienceOn
|
3 |
Lin, I. C., Lin Y. B., Wang, C. M., Hiding Data in Spatial Domain Images with Distortion Tolerance, Computer Standards and Interfaces 31, pp. 458-464, 2009.
DOI
ScienceOn
|
4 |
Lin, C. C., Chen, S. C., Hsueh, N. L., Adaptive Embedding Techniques for VQ-compressed Images, Information Sciences 179, pp. 140-149, 2009.
DOI
ScienceOn
|
5 |
Lee, C. F., Chang, C. C., Wang, K. H., An Improvement of EMD Embedding Method for Large Payloads by Pixel Segmentation Strategy, Image and Vision Computing 26, pp. 1670-1676, 2008.
DOI
ScienceOn
|
6 |
Goljan, M., Fridrich, J., Holotyak. T., New Blind Steganalysis and Its Implications, Proceedings of SPIE Electronic Imaging, pp. 1-13, 2006.
|
7 |
Cheddad, A., Condell, J., Curran, K., Kevitt. P. M., Digital Image Steganography : Survey and Analysis of Current Methods, Signal Processing 90, pp. 727-752, 2010.
DOI
ScienceOn
|
8 |
Wu, H. C., Wang, H. C. Tsai, C. S., Wang, C. M., Reversible Image Steganographic Scheme Via Predictive Coding, Displays 31, pp. 35-43, 2010.
DOI
ScienceOn
|
9 |
Sabeti, V., Samvi, S., Mahdavi, M., Shirani, S., Steganalysis and Payload Estimation of Embedding in Pixel Differences using Neural Networks, Pattern Recognition 43, pp. 405-415, 2010.
DOI
ScienceOn
|
10 |
Fridrich, J., Goljan, M., Du, R., Invertible Authentication, Proceedings of SPIE, Security and Watemarking of Multimedia Contents, pp. 197-208, 2001.
|
11 |
Macq, B., Deweyand F., Trusted Headers for Medical Images, DFG VIII-D II Watermarking Workshop, Erlangen, Germany, 1999.
|
12 |
Chan, C. K., Cheng, L. M., Hiding Data in Images by Simple LSB Substitution, Pattern Recognition 37, pp. 469-474, 2004.
DOI
ScienceOn
|
13 |
Johnson, N. F., Exploring Steganography - Seeing the Unseen, Computer Practices, pp. 26-34, 1998.
|
14 |
Chang, C. C., Lin, M. H., Hu, Y. C., A Fast and Secure Image Hiding Scheme Based on LSB Substitution, International Journal of Pattern Recognition 16, pp. 399-416, 2002.
DOI
ScienceOn
|
15 |
Wang, R. Z., Lin, C. F., Lin, J. C., Image Hiding by Optimal LSB Substitution and Genetic Algorithm, Pattern Recognition 34, pp. 671-683, 2001.
DOI
ScienceOn
|
16 |
Chang, K. C., Huang, P. S., Tu, T. M., Chang, C. P., Adaptive Image Steganographic Scheme Based on Tri-way Pixel-value Dierencing, Systems, Man and Cybernetics, IEEE, pp. 1165-1170, 2007.
|
17 |
Wu, D. C., Tsai, W. H., A Steganographic Method for Images by Pixel-value Differencing, Pattern Reccognition Letters 24, pp. 1613-1626, 2003.
DOI
ScienceOn
|
18 |
Swanson, M. Kobayashi, M. Tewk. A., Multimedia Data Embedding and Water-marking Technologies, Proceeding of IEEE 86, pp. 1064-1087, 1998.
DOI
ScienceOn
|
19 |
Ker, A., Steganalysis of LSB Matching in Grayscale Images, IEEE Signal Processing Letters 12, pp. 441-444, 2005.
DOI
|
20 |
Mielikainen, J., LSB Matching Revisited, IEEE Signal Processing Letters 13, pp. 285-287, 2006.
DOI
|
21 |
Yang, C. H., Weng, C. Y., A Steganographic Method for Digital Images by Multi-pixel Differencing, International Computer Symposium, IEEE, pp. 831-836, 2006.
|