|
[1] D. Yu, F. Sattar and B. Barkat, “Multiresolution Fragile Watermarking using Complex Chirp Signals for Content Authentication,” Pattern Recognition, May 2006, Vol. 39, Issue 5, pp. 935-952. [2] J. L. Liu, D. C. Lou, M. C. Chang, and H. K. Tso, “A Robust Watermarking Scheme using Self-Reference Image,” Computer Standards & Interfaces, Jan. 2006, Vol. 28, Issue 3, pp. 356-367. [3] J. Fridrich, M. Goljan, and R. Du, “Detecting LSB Steganography in Color, and Gray-scale Images,” IEEE Multimedia, 2001, Vol. 8, No. 4, pp. 22-28. [4] C. C. Chang, and H. W. Tseng, “A Steganographic Method for Digital images using Side Match,” Pattern Recognition Letters, Sep. 2004, Vol. 25, No.12, pp. 1431–1437. [5] D. C. Wu, and W. H. Tsai, “A Steganographic Method for Images by Pixel-Value Differencing,” Pattern Recognition Letters, Jun. 2003, Vol. 27, No. 9-10, pp. 1613–1626. [6] Min-Yen Chiu, Yu-Sheng Liao, and Jiun-Jian Liaw, “Improved Steganographic Technique for the Image Quality of PVD,” International Conference on Advanced Information Technologies, 2010, pp. 98. [7] Reza Jafari, Ziou Djemel, and Mammeri Abdelhamid, “Increasing Compression of JPEG images Using Steganography,” Robotic and Sensors Environments (ROSE) IEEE, 2011, pp. 226 - 230 [8] Chin-Chen Chang, Yung-Chen Chou, and Jau-Ji Shen, “Improving Image Quality for JPEG Compression Knowledge-Based Intelligent Information and Engineering Systems,” Lecture Notes in Computer Science Vol. 3683, 2005, pp. 442-448. [9] G. K. Wallace, “The JPEG still picture compression standard,” IEEE Transactions on Consumer Electronics, 1992, Vol. 38, No. 1. [10] D. A. Huffman, “A method for the construction of minimum redundancy codes,” Proc. IRE, 1952, Vol. 40, pp. 1098-l 101.
|