|
[1]E. Besdok, “Hiding Information in Multispectral Spatial Images,” Journal of Electronics and Communications, Vol. 59, pp. 15-24, 2005. [2]P. Borges, J. Mayer, and E. Izquierdo, “Robust and Transparent Color Modulation for Text Data Hiding,” IEEE Transactions on Multimedia, vol. 10, no. 8, pp. 1479–1489, Dec., 2008. [3]C. K. Chan and L. M. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Pattern Recognition, Vol. 37, pp. 469-474, Mar. 2004. [4]C. C. Chang and H. W. Tsai, “A Steganographic Method for Digital Images using Side Match,” Pattern Recognition Letters, No. 25, pp. 1431-1437, 2004. [5]C. C. Chang, C. Y. Lin and Y. Z. Wang, “New Image Steganographic Methods using Run-Length Approach,” Information Sciences, Vol. 176, pp.3393-3408, 2006. [6]H. Farid, “Detecting Hidden Messages Using Higher-Order Statistical Models,” International Conference on Image Processing, Rochester, NY, pp. 905-908, 2002. [7]M. S. Fu and O. C. Au, “Data Hiding Watermarking for Halftone Images,” IEEE Transactions on Image Processing, Vol. 11, No. 4, pp.477-484, 2002. [8]J. Fridrich, M. Goljan, and R. Du, “Detecting LSB Steganography in Color and Gray-Scale Images,” Magazine of IEEE Multimedia Special Issue on Security, pp. 22-28, Dec. 2001. [9]J. Fridrich, M. Goljan, and R. Du, “Reliable Detection of LSB Steganography in Grayscale and Color Images,” Proceedings of ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, pp. 27-30, Oct. 2001. [10]J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal, “Writing on wet paper,” IEEE Transactions on Signal Processing, Vol. 53, No. 10, pp. 3923–3935, Oct. 2005. [11]J. Fridrich and D. Soukal, “Matrix Embedding for Large payloads,” IEEE Transactions on Information Forensics and Security, Vol. 1, pp. 390-395, Sep. 2006. [12]J. Fridrich and P. Lisonˇek, “Grid coloring in steganography,” IEEE Transactions on Information. Theory, vol. 53, no. 4, pp. 1547–1549, Apr. 2007. [13]F. Galand and G. Kabatiansky, “Information hiding by coverings,” in Proc. IEEE Information Theory Workshop, 2004, pp. 151–154. [14]Hartung and M. Kutter, “Information hiding - a survey, Proceedings of the IEEE: Special Issue on Identifcation and Protection of Multimedia Content, vol. 87 Issue:7, pp. 1062--1078, Jul. 1999. [15]J. J. Harmsen and W. A. Perarlman, “Capacity of Steganographic Channels,” IEEE Transactions on Information Theory, vol. 55, pp. 1775-1792, APR. 2009. [16]W. C. Hsieh, N. I. Wu, and C. M. Wang, “A novel data hiding scheme for binary images with the minimal distortion,” Journal of Internet Technology, vol.11, no. 7, Dec. 2010. [17]J. C. Joo, H. Y. Lee, and H. K. Lee, “Improved steganographic method preserving pixel-value differencing histogram with modulus function," EURASIP Journal on Advances in Signal Processing, p. Article in Press, 2010. [18]D. C. Lou and J. L. Liu, “Steganographic Method for Secure Communications,” Computers and Security, Vol. 21, pp.449-460, Jun. 2002. [19]D. C. Lou, N. I. Wu, C. M. Wang, Z. H. Lin and C. S. Tsai “A novel adaptive steganography based on local complexity and human vision sensitivity”, The Journal of Systems and Software, vol. 83, no 7, pp. 1236-1248, 2010. [20]S. Lyu and H. Farid, “Steganalysis Using Color Higher-Order Image Statistics, ” IEEE Transactions on Information Forensics and Security, Vol. 1, No. 1, pp. 111-119, Mar. 2004. [21]J. C. Liu and M. H. Shih, “Generalizations of pixel-value differencing steganography for data,” Fundamenta Informaticae, vol. 83, pp.319-335, Aug. 2008. [22]X. L. Li, B. Yang, D. F. Cheng, and T. Y. Zeng, “A generalization of LSB matching,” IEEE Signal Processing Letters, vol. 16, pp. 69-72, FEB. 2009. [23]W. C. Li, N. I. Wu and C. M. Wang, “A High Capacity and High Quality Data Hiding Algorithm for High Dynamic Range Images,” Journal of Internet Technology, vol. 10, no. 5, pp.435-448, Oct 2009. [24]C. F. Lee and H. L. Chen, “A novel data hiding scheme based on modulus function,” The Journal of System and Software, vol. 83, pp. 832--843, May 2010. [25]A. Martin, G. Sapiro and G. Seroussi, “Is Image Steganography Natural,” IEEE Transactions on Image Processing, Vol. 14, No. 12, Dec. 2005. [26]J. Mielikainen, “LSB matching revisited,” IEEE Signal Processing Letter, Vol. 13, No. 5, pp. 285–287, May 2006. [27]P. A. Regalia, “Cryptographic secrecy of steganographic matrix embedding,” IEEE Transactions on Information Forensics and Security, vol. 3, pp. 786-791, DEC. 2008. [28]K. Tanaka, Y. Nakamura, and K. Matsui, “Embedding secret information into a dithered multi-level image," Proc. IEEE Milcom, pp. 216--220, 1990. [29]C. C. Thien and J. C. Lin, “A Simple and High-hiding Capacity Method for Hiding Digit-by-Digit Data in Images Based on Modulus Function,” Pattern Recognition, Vol. 36, No.12. 2004. [30]Y. C. Tseng, Y. Y. Chen, and H. K. Pan, “A Secure Data Hiding Scheme for Binary Images,” IEEE Transactions on Communications, Vol. 50, pp.1227-1231, Aug. 2002. [31]Y. C. Tseng and H. K. Pan, “Data Hiding in 2-color Images,” IEEE Transactions on Computers, Vol. 51, No. 7, pp.873-878, Jul. 2002. [32]C. H. Tzeng, Z. F. Yang, and W. H. Tsai, “Adaptive Data Hiding in Palette Images by Color Ordering and Mapping with Security Protection,” IEEE Transactions on Communications, Vol. 52, pp.791-800, May 2004. [33]S. J. Wang, “Steganography of Capacity Required Using Modulo Operator for Embedding Secret Image,” Applied Mathematics and Computation, pp.99-116, Jan. 2005. [34]C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, “A high quality steganographic method with pixel-value differencing and modulus function,” The Journal of Systems and Software, vol. 81, pp. 150-158, Jan 2008. [35]C. M. Wang and P. C. Wang, “Steganography on point-sampled geometry,” Computers and Graphics, vol. 30, pp. 1719--1726, Apr. 2006. [36]R. Z. Wang, C. F. Lin, and J. C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, vol. 34, pp. 671--683, Mar. 2001. [37]K. Wong, K. Tanaka, K. Takagi, and Y. Nakajima, “Complete video quality-preserving data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 10, pp. 1499-1512, Oct., 2009. [38]D. C. Wu and W. H. Tsai, “A Steganographic Method for Images by Pixel-Value Differencing,” Pattern Recognition Letters, Vol. 24, No.9-10, pp.1613-1626, 2003. [39]M. Y. Wu, Y. K. Ho, and J. H. Lee, “An Iterative Method of Palette-Based Image Steganography,” Pattern Recognition Letters, Vol. 25, pp.301-309, 2004. [40]M. Wu and B. Liu, “Data Hiding in Binary Image for Authentication and Annotation,” IEEE Transactions on Multimedia, Vol.6, pp.528-538, Aug. 2004. [41]H. C. Wu, N. I. Wu, C. S. Tsai and M. S. Hwang, “Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods,” IEE Proceedings on Vision Image and Signal Processing, Vol. 152, No. 5, pp.611-615, Oct. 2005. [42]N. I Wu and M. S. Hwang, “Data hiding: Current status and key issues,” International Journal of Network Security, vol. 4, pp. 1--9, Jan. 2007. [43]N. I. Wu, K. C. Fu, and C. M. Wang, “A novel data hiding method for grayscale images based on pixel-value differencing and modulus function,” Journal of Internet Technology, vol. 11, no. 7, Dec. 2010. [44]F. Willems and M. Dijk, “Capacity and codes for embedding information in gray-scale signals,” IEEE Transactions on Information Theory, Vol. 51, No. 3, pp. 1209–1214, Mar. 2005. [45]C. M. Wang, N. I. Wu, C. S. Tsai and M. S. Hwang, “A High Quality Steganographic Method with Pixel-Value Differencing and Modulus Operation,” The Journal of System and Software, Vol. 81, pp. 150-158, Jan. 2008. [46]R. Z. Wang and Y. S. Chen, “High-Payload Image Steganography Using Two-Way Block Matching,” IEEE Signal Processing Letters, Vol. 13, pp.161-164, Mar. 2006. [47]Y. H. Yu, C. C. Chang and Y. C. Hu, “Hiding Secret data in images via predictive coding,” Pattern Recognition, Vol. 38, pp. 691-705, May 2005. [48]H. Yang and A. C. Kot, “Pattern-based data hiding for binary image authentication by connectivity-preserving,” IEEE Transactions on Multimedia, vol. 9, pp. 475--486, Apr. 2007. [49]C. H. Yang, C. Y. Wang, S. J. Wang, and H. M. Sun, “Adaptive data hiding in edge areas of images with spatial LSB domain systems,” IEEE Transactions on Information Forensics and Security, vol. 3, pp. 488-497, Sep. 2008. [50]H. Yang, A. C. Kot, and S. Rahardja, “Orthogonal data embedding for binary images in morphological transform domain—a high-capacity approach,” IEEE Transactions on Multimedia, vol. 10, pp.339-351, Apr. 2008. [51]C. H. Yang, “Inverted pattern approach to improve image quality of information hiding by LSB substitution,” Pattern Recognition, vol. 41, pp. 2674-2683, AUG. 2008. [52]C. F. Yang, F. L. Liu, X. Y. Luo, and B. Liu, “Steganalysis frameworks of embedding in multiple least-significant bits,” IEEE Transactions on Information Forensics and Security, vol. 3, pp. 662-672, DEC. 2008. [53]C.H. Yang, C. Y. Weng, S. J. Wang, and H. M. Sun, “Varied PVD+LSB evading detection programs to spatial domain in data embedding systems,” The Journal of System and Software, vol. 83, pp. 1635--1643, Oct. 2010. [54]X. Zhang and S. Wang, “Steganography Using Multiple-Base Notational System and Human Vision Sensitivity,” IEEE Signal Processing Letters, Vol. 12, pp.67-70, Jan. 2005. [55]X. Zhang and S. Wang, “Vulnerability of Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security,” Patter Recognition Letters, No. 25, pp. 331-339, 2004. [56]X. Zhang and S. Wang, “Dynamical Running Coding in Digital Steganography,” IEEE Signal Processing Letters, Vol. 13, pp. 165-168, Mar. 2006. [57]X. Zhang and S. Wang, “Efficient steganographic embedding by exploiting modification direction,” IEEE Communication Letter, Vol. 10, No. 11, pp. 781–783, Nov. 2006. [58]W. Zhang, X. Zhang and S. Wang, “A Double Layered “Plus-Minus One” Data Embedding Scheme,” IEEE Signal Processing Letter, Vol. 14, No. 11, pp. 848–851, Nov. 2007. [59]X. Zhang, W. Zhang and S. Wang, “Efficient Double-Layered Steganographic Embedding,” Electronics Letters, Vol. 43, No. 8, pp.482-483, Apr. 2007. [60]X. P. Zhang, S. H. Wang, and Z. Y. Zhou, “Multibit assignment steganography in palette images,” IEEE Signal Processing Letters, vol. 15, pp. 553-556, 2008. [61]Z. Y. Zhang, C. Zhu, and Y. Zhao, “Two-description image coding with steganography,” IEEE Signal Processing Letters, vol. 15, pp. 887-890, 2008.
|