|
[1] R. Davis, “The data encryption standard in perspective,” IEEE Communications Society Magazine, vol. 16, no. 6, pp 5-9, 1978. [2] J. Nechvatal, E. Barker, L. Bassham, W. Burr, M. Dworkin, J. Foti, and E. Roback, “Report on the Development of the Advanced Encryption Standard (AES),” Journal of Research of NIST, vol. 106, no. 3, pp 511-577, 2001. [3] C. Mclvor ; M. McLoone ; J.V. McCanny, “Fast Montgomery modular multiplication and RSA cryptographic processor architectures,” The Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, pp 379-384, 2003 [4] N. Provos and P. Honeyman, “Hide and Seek: An Introduction To Steganography,” IEEE Security & Privacy, vol. 1, no. 3, pp 32-44, 2003. [5] K. Bennett, “Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text,” Purdue University, CERIAS Tech. Report 2004-13, 2004. [6] X.P. Zhang and S.Z. Wang, “Steganography using multiple-base notational system and human vision sensitivity,” IEEE Signal Processing Letters, vol. 12, no. 1, 2005. [7] X. Li, J. Li, B. Li, and B. Yang, “High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion,” Signal processing, vol. 93, no. 1, pp. 198-205, 2013. [8] J. Tian, “Reversible data embedding using a difference expansion,” IEEE transactions on circuits and systems for video technology, vol. 13, no. 8, pp. 890-896, 2003. [9] C.K. Chan, L.M. Cheng “Hiding data in images by simple LSB substitution,” Pattern Recognition, vol. 37, no. 3, pp 469-474, 2004. [10] D.C. Wu, W.H. Tsai, “A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters , vol. 24, pp 1613-1626, 2003. [11] X.P. Zhang and S.Z. Wang, “Efficient Steganographic Embedding by Exploiting Modification Direction,” IEEE Communications Letters, vol. 10, no. 11, pp 781-783, 2006. [12] W.J. Chen, C.C. Chang, T. H. N. Le ,“High payload steganography mechanism using hybrid edge detector,” Expert Systems with Applications, vol. 37, no. 4, pp 3292–3301, 2010 [13] C.F. Lee, C.C. Chang, and P.L. Tsou, “Data hiding scheme with high embedding capacity and good visual quality based on edge detection,” 2010 The Fourth International Conference on Genetic and Evolutionary Computing, pp.654–657, 2010. [14] H. Dadgostar, F. Afsari, “Image steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSB,” Journal of Information Security and Applications, vol. 30, pp 94-104, 2016. [15] J.-L. Bai, C.-C. Chang, T.-S. Nguyen, C. Zhu, Y.-J. Liu, “A high payload steganographic al-gorithm based on edge detection,” Displays, vol. 46, pp 42-51, 2017. [16] H.C. Wu; N.I. Wu; C.S. Tsai; M.S. Hwang, “Image steganographic scheme based on pixel-value differencing and LSB replacement methods,” IEE Proceedings - Vision, Image, and Signal Processing, vol. 152, no. 5, pp 611-615, 2005. [17] K.H. Jung, “Data hiding scheme improving embedding capacity using mixed PVD and LSB on bit plane,” Journal of Real-Time Image Processing, vol. 14, no. 1, pp 127-136, 2018. [18] N. Kanopoulos ; N. Vasanthavada ; R.L. Baker, “Design of an image edge detection filter using the Sobel operator,” IEEE Journal of Solid-State Circuits, vol. 23, no. 2, 1988. [19] J. Canny, “A Computational Approach to Edge Detection,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. PAMI-8, no. 6, 1986.
|