|
[1] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, ``Information hiding-a survey,'' Proc. IEEE, vol. 87, no. 6, pp. 1062-1078, Jul. 1999. [2] A. Baros, F. Franco, D. Delannay, and B. Macq, ``Rate-distortion analysis of steganography for conveying stereovision disparity maps,'' Proc. SPIE, vol. 5306, pp. 268-273, Jan. 2004. [3] M. J. Wainwright, ``Sparse Graph Codes for Side Information and Binning,'' IEEE Signal Process. Mag., vol. 24, no. 5, pp. 47-57, Sep. 2007. [4] R.G. Gallager. ``Low-Density Parity Check Codes.'' Cambridge, MA: MIT Press, 1963. [5] J. Fridrich, T. Filler, ``Practical methods for minimizing embedding impact in steganography,'' in Proc, SPIE, Security, Steganography, and Watermarking of Multimedia, vol. 6050, 2007. [6] S. Gelfand and M. Pinsker, ``Coding for channel with random parameters,'' Probl, Control Inform. Theory, vol. 9, no. 1, pp. 19-31, Jan. 1980. [7] J. Fridrich and D. Soukal, ``Matrix embedding for large payloads'' IEEE Trans. Inf. Theory, vol. 1, no. 3, pp. 390-395, Sep. 2006. [8] R. Crandall. Some notes on steganography. Steganography Mailing List, avail-able from http://os.inf.tu-dresden.de/westfeld/crandall.pdf, 1998. [9] J. Bierbrauer, On Crandall''s Problem [Online]. Available: http:// www.ws.binghamton.edu/fridrich/covcodes.pdf 1998. [10] R. Y. M. Li, O. C. Au, K. K. Lai, C. K. M. Yuk, and S.-Y. Lam, ``Data hiding with tree based parity check,'' in Proc. IEEE Int. Conf. Multimedia and Expo (ICME 07), 2007, pp. 635-638. [11] R. Y. M. Li, O. C. Au, C. K. M. Yuk, S. K. Yip, and S. Y. Lam, ``Halftone Image Data Hiding with Block-Overlapping Parity Check,'' Proc. IEEE, vol. 2, pp. 1930-196, Apr. 2007. [12] Y. C. Tseng, Y. Y. Chen, and H. K. pan, ``A secure data hiding scheme for binary images,'' IEEE Trans. Commun., vol. 50, no. 8, pp. 1227-1231, Aug.2002. [13] C. Hou, C. Lu, S. Tsai, and W. Tzeng, ``An optimal data hiding scheme with tree-based parity check,'' IEEE Trans. Image Process., vol. 20, no. 3, pp. 880-886, Mar. 2011. [14] Jiayong Chen, Yuefei Zhu, Yong Shen and Weiming Zhang, ``Efficient Matrix Embedding Based on Random Linear Codes,'' in Proc. MINES2010, pp. 879-883, Dec. 2010. [15] Yunkai Gao, Xiaolong Li and Bin Yang, ``Employing optimal matrix for efficient matrix embedding,'' in Proc. IIH-MSP2009, pp.161-165, Sep. 2009. [16] J.-J. Wang and H. Chen, ``A suboptimal embedding algorithm with low complexity for binary data hiding'', in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), kyoto, Japan, Mar. 2012. [17] J.-J. Wang, H. Chen, and C.-Y. Lin, ``An adaptive matrix embedding technique for binary hiding with an efficient LIAE algorithm,'' World Scientific and Engineering Academy and Society (WSEAS), vol. 8, issue 2, April 2012. [18] J.-J.Wang, H. Chen, and C.-Y. Lin, ``A low-complexity matrix embedding technique for grayscale signals,'' An International Journal of Research and Surveys (ICIC-ELB), vol. 3, issue 3, June 2012. [19] F. Galand and G. Kabatiansky. Information hiding by coverings. In Proceedings ITW2003, Paris, France, 2003, pages 151-154. [20] W. Zhang, X. Zhang, and S. Wang, ``Maximizing steganographic embedding efficiency by combining hamming codes and wet paper codes," in Proc. Int. Workshop Inf. Hiding (IH 08), 2008, vol. LNCS 5284, pp. 60-71. [21] J. Fridrich, ``Asymptotic behavior of the ZZW embedding construction,'' IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 151 154, Mar. 2009. [22] W. Zhang and X. Wang, ``Generalization of the ZZW embedding construction for steganography,'' IEEE Trans. Inf. Forensics Security, vol. 4, pp. 564-569, Sep. 2009. [23] T. Filler and J. Fridrich, ``WET ZZW construction for steganography,'' in IEEE Workshop on Information Forensic and Security (WIFS), London, U.K., Dec. 7-9, 2009. [24] D. SchÄonfeld and A. Winkler, ``Embedding with syndrome coding based on BCH codes,'' in Proc. ACM 8th Workshop on Multimed. Secur., 2006, pp. 214-223. [25] J. Bierbrauer and J. Fridrich, ``Constructing good covering codes for applications in steganography,'' LNCS Trans. Data Hiding and Multimed. Secur., vol. 4920, no. 3, pp. 1-22, 2008. [26] J.-J. Wang, H. Chen, and C.-Y. Lin, ``A robust informed embedding with low complexity for digital watermarking,'' International Journal of Innovative Com- puting, Information and Control (IJICIC), vol. 8, no. 9, Sep. 2012. [27] J.-J.Wang, H. Chen and H. Liang, ``A Trellis-Based Informed Embedding With Linear Codes for Digital Watermarking,'' in Proc. IEEE ISCE 2011, Singapore, June, 2011. [28] M. F. Horng, B. C. Huang, M. H. Lee and Y. H. Kuo, ``A DC-based approach to robust watermarking with Hamming-code,'' International Journal of Innovative Computing, Information and Control (IJICIC), vol. 5, no. 7, pp. 1911-1917, Jul. 2009. [29] Zhaoxia Yin, Chinchen Chang and Yanping Zhang, ``An information hiding scheme based on (7,4) Hamming code oriented wet paper codes,'' International Journal of Innovative Computing, Information and Control (IJICIC), vol. 6, no. 7, pp. 3121-3130, Jul. 2010. [30] L. D. Li and B. L. Guo, ``Robust image watermarking using feature based local invariant regions,'' International Journal of Innovative Computing, Information and Control (IJICIC), vol. 4, no. 8, pp. 1977-1986, Aug. 2008. [31] J. A. Bloom, I. J. Cox, T. Kalker, J.-P. M. G. Linnartz, M. L. Miller, and C. B. S. Traw, ``Copy protection for digital video," Proc. IEEE Special Issue on Identi¯cation and Protection of Multimedia Information, vol. 87, no. 7, pp. 1267-1276, Jul. 1999. [32] Li Fan, Tiegang Gao and Qunting Yang, ``A novel watermarking scheme for copyright protection based on adaptive joint image feature and visual secret sharing,'' International Journal of Innovative Computing, Information and Control (IJICIC), vol. 7, no. 7(A), pp. 3679{3694, Jul. 2011. [33] D. Boneh and J. Shaw, ``Collusion-secure ngerprinting for digital data,'' IEEE Trans. Inf. Theory, vol. 44, no. 5, pp. 1897-1905, 1998. [34] D. H. Im, Y. Hu, H. Y. Lee and H. K. Lee, ``Watermarking curves for ¯ngerprinting digital maps,'' International Journal of Innovative Computing, Information and Control (IJICIC), vol. 6, no. 3(B), pp. 1257-1269, Mar. 2010. [35] D. Kundeur and D. Hatzinakos, ``Digital watermarking for telltale tamperprooing and authentication,'' Proc. IEEE, vol. 87, no. 7, pp. 1167-1180, Jul. 1999. [36] Ayhan lmaz, A. Ayd Alatan, ``Error detection and concealment for video transmission using information hiding,'' Signal Processing: Image Communication, vol. 23, Issue 4, pp. 298-312, Apr. 2008. [37] S. D. Lin and Y. H. Huang, ``An integrated watermarking technique with tamper detection and recovery,'' International Journal of Innovative Computing, Information and Control (IJICIC), vol. 5, no. 11(B), pp. 4309-4316, Nov. 2009. [38] J. T. Wang, Y. W. Yang, Y. T. Chang and S. S. Yu, ``A high verification capacity reversible fragile watermarking scheme for 3D models,'' International Journal of Innovative Computing, Information and Control (IJICIC), vol. 7, no. 1, pp. 365-378, Jan. 2011. [39] F. Bartolini, A. Tefas, M. Barni, and I. Pitas, ``Image authentication techniques for surveillance applications,'' Proc. IEEE, vol. 89, no. 10, pp. 1403-1418, Oct. 2001. [40] E. Martinian and G. W. Wornell, ``Authentication with distortion constraints,'' in Proc. IEEE Int. Conf. Image Processing, pp. 17-20, 2002. [41] I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking, New York: Morgan Kaufmann, 2001. [42] P. Moulin and R. Koetter, ``Data-hiding codes,'' Proc. IEEE, vol. 93, no. 12, pp. 2083-2126, Dec. 2005. [43] I. J. Cox, M. L. Miller, and A. McKellips, ``Watermarking as communications with side information,'' Proc. IEEE, vol. 87, pp. 1127-1141, Jul. 1999. [44] M. H. M. Costa, ``Writing on dirty paper,'' IEEE Trans. Inf. Theory, vol. 29, pp. 439-441, 1993. [45] Y. Sun, Y. Yang, A. D. Liveris, V. Stankovic, and Z. Xiong, ``Near-capacity dirty-paper code design: a source-channel coding approach," IEEE Trans. Inf. Theory, vol. 55, no. 7, pp. 3013-3031, Jul. 2009. [46] R. Barron, B. Chen, and G. W. Wornell, ``The duality between information embedding and source coding with side information and some applicaitons,'' IEEE Trans. Inf. Theory, vol. 49, no. 5, pp. 1159-1180, May 2003. [47] S. S. Pradhan, J. Chou, and K. Ramchandran, ``Duality bewteen source coding and channel coding and its extension to the side information case,'' IEEE Trans. Inf. Theory, vol. 49, no. 5, pp. 1181-1203, May 2003. [48] Chun-Shien Lu, ``Towards robust image watermarking: combining content dependent key, moment normalization, and side-informed embedding,'' Signal Processing: Image Communication, vol. 20, Issue 2, pp. 129-150, Feb. 2005. [49] R. Zamir, S. Shamai, and U. Erez, ``Nested linear/lattice codes for structured multierminal binning," IEEE Trans. Inf. Theory, vol. 48, no. 6, pp. 1250-1276, Jun. 2002. [50] M. J.Wainwright, ``Sparse graph codes for side information and binning,'' IEEE Signal Processing Mag., vol. 24, no. 5, pp. 47-57, Sep. 2007. [51] Claude Desset, Benot Macq, Luc Vandendorpe, ``Block error-correcting codes for systems with a very high BER: Theoretical analysis and application to the protection of watermarks,'' Signal Processing: Image Communication, vol. 17, Issue 5, pp. 409-421, May. 2002. [52] M. L. Miller, I. J. Cox, and J. A. Bloom, ``Informed embedding: exploiting image and detector information during watermark insertion,'' in IEEE Int. Conf. on Image Processing, Sep. 2000. [53] M. L. Miller, G. J. Doerr, and I. J. Cox, ``Applying informed coding and embedding to design a robust high-capacity watermark,'' IEEE Trans. Image Process., vol. 13, no. 6, pp. 792-807, Jun. 2004. [54] L. Lin, G. Doerr, I. Cox, and M. Miller, ``An e±cient algorithm for informed embedding of dirty-paper trellis codes for watermarking,'' in Proc. IEEE Int. Conf. Image Processing, Italy, 2005. [55] G. D. Forney, ``The Viterbi algorithm,'' Proc. IEEE, vol. 61, pp. 268-278, Mar. 1973.
|