1 |
C. K. Chan et al., Hiding data in images by simple LSB substitution, Pattern Recog. 37 (2004), 469-474.
DOI
|
2 |
J. Fridrich et al., Reliable detection of LSB steganography in color and grayscale images, Int. Conf. Multimedia Security: New Challenges, Ottawa, Canada, Oct. 2001, pp. 27-30.
|
3 |
X. Zhang and S. Wnag, Efficient steganographic embedding by exploiting modification direction, IEEE Commun. Lett. 10 (2006), no. 11, 781-783.
DOI
|
4 |
H. Hajizadeh, A. Ayatollahi, and S. Mirzakuchaki, A new high capacity and EMD-based image steganography scheme in spatial domain, Iranian Conf. Electrical Eng., Mashhad, Iran, May 2013, pp. 1-6.
|
5 |
T. D. Kieu and C. Chang, A steganographic scheme by fully exploiting modification directions, Expert Syst. Appl. 38 (2011), no. 8, 10648-10657.
DOI
|
6 |
J. H. Kim et al., Improved modification direction methods, Comput. Math. Appl. 60 (2010), no. 2, 319-325.
DOI
|
7 |
C. F. Lee, Y. R. Wnag, and C. C. Chang, A steganographic method with high embedding capacity by improving exploiting modification direction, Int. Conf. Intell. Inform. Hiding Multimedia Signal Process., Kaohsiung, Taiwan, Nov. 2007, pp. 497-500.
|
8 |
J. Wang et al., An improved section-wise exploiting modification direction method, Signal Process. 90 (2010), no. 11, 2954-2964.
DOI
|
9 |
C. C. Chang, Y. C. Chou, and T. D. Kieu, An information hiding scheme using Sudoku, Int. Conf. Innovative Comput. Inform. Contr., Dalian, Liaoning, China, June 2008, pp. 17-22.
|
10 |
D. C. Wu et al., A steganographic method for images by pixelvalue differencing, Pattern Recog. Lett. 24 (2003), no. 9-10, 1613-1626.
DOI
|
11 |
J. C. Joo, H. Y. Lee, and H. K. Lee, Improved steganographic method preserving pixel-value differencing histogram with modulus function, EURASIP J. Adv. Signal Proc. 2010 (2010), 1-13.
|
12 |
C. M. Wang et al., A high quality steganographic method with pixel-value differencing and modulus function, J. Sys. Soft. 81 (2008), no. 1, 150-158.
DOI
|
13 |
J. Mielikainen, LSB matching revisited, IEEE Signal Process. Lett. 13 (2006), no. 5, 285-287.
DOI
|
14 |
B. K. Panigrahi and P. S. Reddy, High quality high capacity robust DWT based steganography, Int. J. Innov. Res. Dev. 3 (2014), no. 5, 49-52.
|
15 |
S. Y. Shen and L. H. Huang, A data hiding scheme using pixel value differencing and improving exploiting modification directions, Comput. Security 48 (2015), 131-141.
DOI
|
16 |
B. Kaur, A. Kaur, and J. Singh, Steganographic approach for hiding image in DCT domain, Int. J. Adv. Eng. Technol. 1 (2011), 72-78.
|
17 |
C. C. Lin and P. F. Shiu, High capacity data hiding scheme for DCT-based images, J. Inform. Hiding Multimedia Signal Proc. 1 (2010), no. 3, 220-240.
|
18 |
Y. P. Lee et al., High-payload image hiding with quality recovery using tri-way pixel-value differencing, Inform. Sci. 191 (2012), 214-255.
DOI
|
19 |
X. Zhang, S. Wnag, and Z. Zhou, Multibit assignment steganography in palette images, IEEE Sign. Proc. Lett. 15 (2008), 553-556.
DOI
|
20 |
H. Z. Wu et al., Multi-layer assignment steganography using graph-theoretic approach, Multimedia Tools Appl. 74 (2015), no. 18, 8171-8196.
DOI
|
21 |
S. Voloshynovskiy et al., Attacks on digital watermarks: Classification, estimation based attacks and benchmarks, IEEE Commun. Mag. 39 (2001), no. 8, 118-126.
DOI
|
22 |
N. M. Makbol and B. E. Khoo, Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition, AEU - Int. J. Elec. Commun. 67 (2013), no. 2, 102-112.
DOI
|
23 |
Z. Wang and A. C. Bovik, A universal image quality index, IEEE Sign. Proc. Lett. 9 (2002), no. 3, 81-84.
DOI
|
24 |
C. T. Lu, C. C. Chang, and Y. H. Huang, High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting, Multimedia Tools Appl. 72 (2014), no. 1, 417-435.
DOI
|
25 |
C. C. Chang and T. C. Lu, A difference expansion oriented data hiding scheme for restoring the original host image, J. Sys. Soft. 79 (2006), no. 12, 1754-1766.
DOI
|