1 |
R. Z. Wang, C. F. Lin, and J. C. Lin, "Image Hiding by Optimal LSB Substitution and Genetic Algorithm," Pattern Recognition, Vol. 34, No. 3, pp. 671-683, 2001.
DOI
ScienceOn
|
2 |
Y. H. Yu, C. C. Chang, and I. C. Lin, "A New Steganographic Method for Color and Grayscale Image Hiding," Computer Vision and Image Understanding, Vol. 107, No. 3, pp. 183-194, 2007.
DOI
|
3 |
C. C. Change and H. W. Tseng, "A Steganographic Method for Digital Images using Side Match," Pattern Recognition Letters, Vol. 25, No. 12, pp. 1431-1437, 2004.
DOI
ScienceOn
|
4 |
C. C. Lin and N. L. Hsueh, "A Lossless Data Hiding Scheme based on Three-pixel Block Differences," Pattern Recognition, Vol. 41, No. 4, pp. 1415-1425, 2008.
DOI
ScienceOn
|
5 |
T. Morkel, J. H. P. Eloff, and M. S. Olivier, "An Overview of Image Steganography," Information and Computer Security Architecture (ISSA), pp. 1-11, 2005.
|
6 |
C. L. Liu and S. R. Liao, "High-performance JPEG Steganography using Complementary Embedding Strategy," Pattern Recognition, Vol. 41, No. 9, pp. 2945-2955, 2008.
DOI
|
7 |
C. C. Chang, C. Y. Lin, and Y. Z. Wang, "New Image Steganographic Methods using Runlength Approach," Information Sciences, Vol. 176, No. 22, pp. 3393-3408, 2006.
DOI
|
8 |
D. C. Wu and W. H. Tsai, "A Steganographic Method for Images by Pixel-value Differencing," Pattern Recognition Letters, Vol. 24, No. 9, pp. 1613-1626, 2003.
DOI
ScienceOn
|
9 |
J. Fridrich, M. Goljan, and R. Du, "Reliable Detection of LSB Steganography in Color and Grayscale Images," Proceeding of the 2001 Workshop on Multimedia and Security: New Challenges, pp. 27-30, 2001.
|
10 |
R. M. Chao, H. C. Wu, C. C. Lee, and Y. P. Chu, "A Novel Image Data Hiding Scheme with Diamond Encoding," European Association for Signal Processing(EURASIP) Journal on Information Security, Vol. 2009, No. 1, pp. 1-9, 2009.
|
11 |
C. C. Lin, W. L. Tai, and C. C. Chang, "Multilevel Reversible Data Hiding based on Histogram Modification of Difference Images," Pattern Recognition, Vol. 41, No. 12, 3582-3591, 2008.
DOI
ScienceOn
|
12 |
N. Koblitz, A Course in Number Theory and Cryptography, Springer, New York, 1994.
|
13 |
X. Zhang and S. Wang, "Efficient Steganographic Embedding by Exploiting Modification Direction," IEEE Communications Letters, Vol. 10, No. 11, 781-783, 2006.
DOI
ScienceOn
|
14 |
D. Kim, K. Yoo, " A novel Reversible Data Hiding Scheme based on Modulo Operation and Histogram Shifting," Journal of Korea Multimedia Society, Vol. 15, No. 5, pp. 639-650, 2012.
과학기술학회마을
DOI
ScienceOn
|