1 |
D. Artz, "Digital Steganography: Hiding Data Within Data," IEEE Internet Computing, Vol. 5, No.3, pp. 75-80, 2001.
DOI
ScienceOn
|
2 |
R.Z.Wang, C.F. Lin, and J.C. Lin, "Image Hiding by Optimal LSB Substitution and Genetic Algorithm," Pattern Recognition, Vol.34, No.3, pp. 671-683, 2001.
DOI
|
3 |
C.C. Chang, Y.H. Yu, and Y.C. Hu, "Hiding Secret Data in Images Via Predictive Coding," Pattern Recognition, Vol.38, No.5, pp. 691-705, 2005.
DOI
|
4 |
Y.C. Hu, "High Capacity Image Hiding Scheme Based on Vector Quantization," Pattern Recognition, Vol.39, No.9, pp. 1715-1724, 2006.
DOI
|
5 |
C.L Liu and S.R Liao, "High-Performance JPEG Steganography using Complementary Embedding Strategy," Pattern Recognition, Vol. 41, No.9, pp. 2945-2966, 2008.
DOI
|
6 |
M.U. Celik, G. Sharma, A.M. Tekalp., and E. Saber, "Reversible Data Hiding," Proc. of International Conference on Image Processing, Rochester, NY, USA, Vol.2, pp. 157-160, September 24, 2002.
|
7 |
J. Tian, "Wavelet-based Reversible Watermarking for Authentication," Proc. Security and Watermarking of Multimedia Contents IV, Electronic Imaging 2002, Vol.4675, pp. 679-690, 2002.
|
8 |
J. Tian, "Reversible Watermarking by Difference Expansion," Proc. of Workshop on Multimedia and Security, pp. 19-22, 2002.
|
9 |
H.C. Wu, C.C. Lee, C.S. Tsai, Y.P. Chu, and H.R. Chen, "A High Capacity Reversible Data Hiding Scheme with Edge Prediction and Difference Expansion," The Journal of Systems and Software, Vol.82, No.12, pp. 1966-1973, 2009.
DOI
|
10 |
H.C. Wu, H.C. Wang, C.S. Tsai, and C.M. Wang, "Reversible Image Steganographic Scheme Via Predictive Coding," Displays, Vol.31, No.1, pp. 35-43, 2010.
DOI
|
11 |
Y.C. Li, C.M. Yeh, and C.C. Chang, "Data Hiding Based on the Similarity Between Neighboring Pixels with Reversibility," Digital Signal Processing, Vol.20, Issue4, pp. 1116-1128, 2010.
DOI
|
12 |
Z. Ni, Y.U. N.Q. Shi, N. Ansari, and W.E.I. Su, "Reversible Data Hiding," IEEE Transactions on Circuits and Systems for Video Technology, Vol.16, No.3, pp. 354-362, 2006.
DOI
ScienceOn
|
13 |
P. Tsai, Y.C. Hu, and H.L. Yeh, "Reversible Image Hiding Scheme using Predictive Coding and Histogram Shifting," Signal Processing, Vol.89, No.6, pp. 1129-1143, 2009.
DOI
|
14 |
D.S. Kim, G.J. Lee, and K.Y. Yoo, "A Reversible Image Scheme Using Novel Linear Prediction Coding and Histogram Shifting," The 2011 International Conference on Security & Management, pp. 282-287, 2011.
|
15 |
I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, Vol.1. Morgan Kaufmann, 2 edition, 2008.
|
16 |
S.H, Bae, "A High Capacity Reversible Watermarking Using Histogram Shifting", Journal of Korea Multimedia Society, Vol. 13, No. 1, pp. 76-82, 2010.
과학기술학회마을
|