|
[1]A. Ahmadyfard, and H. Modares, “Combining PSO and k-means to enhance data clustering” International Symposium on Telecommunications, pp.688-691, Aug. 2008. [2]A. Al-Gindy, H. Al-Ahmad, R. Qahwaji, and A. Tawfik, “Watermarking of colour images in the DCT domain using Y channel,” IEEE/ACS International Conference on Computer Systems and Applications, pp. 1025-1028, May 2009. [3]M. E. Celebi, “Effective initialization of k-means for color quantization,” IEEE International Conference on Image Processing, pp. 1649-1652, Nov. 2009. [4]D. Charalampidis, “A modified k-means algorithm for circular invariant clustering,” IEEE Transactions on Pattern Analysis and Machine Intelligence,Vol.27,No.12, pp. 1856-1865, Dec. 2005. [5]Qian-lan Deng, “The blind detection of information hiding in color image,” International Conference on Computer Engineering and Technology(ICCET), Vol.7,pp. 346-348, April 2010. [6]Jinxin, Dong. and Minyong, Qi, “A New Algorithm for Clustering Based on Particle Swarm Optimization and K-means,” International Conference on Artificial Intelligence and Computational Intelligence (AICI), Vol.4, pp. 264-268, Nov. 2009. [7]R. Goyal, S. Vijay, S. Agarwal, V. Laxmi, and M.S. Gaur, “Difference steg-analysis for LSB embedding in images,” International Conference on Computer Design and Applications (ICCDA), Vol.1,pp. 407-210, June 2010. [8]Chengqing, Guo. Guoai, Xu. Xinxin, Niu. Yixian, Yang. and Yang, Li, “A color image watermarking algorithm resistant to print-scan,” IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), pp.518-521, June 2010. [9]Chih-Cheng Hung and Li Wan, “Hybridization of particle swarm optimization with the K-Means algorithm for image classification,” IEEE Symposium on Computational Intelligence for Image Processing, pp.60-64, 2009 April. [10]H.G. Kaganami, Zou Beiji and M.S. Soliman, “Advanced Color Images Enhancement Using Wavelet and K-means Clustering,” International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 648-652, Sept 2009. [11]Jia-Hong Lee and Mei-Yi Wu, “Reversible Data Hiding Scheme for Color Image Protection Based on Palette Color Replacement,” International Conference on Innovative Computing Information and Control(ICICIC),pp.24-27, June 2008. [12]Xinwu Li, “Research on Text Clustering Algorithm Based on Improved K_means,” International Conference on Future Computer and Communication, pp.19-22, June 2009. [13]Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh and Chien-Ting Huang, “Palette Partition Based Data Hiding for Color Images,” International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.620-623, Sept 2009. [14]Mahamed G. Omran and Andries P. Engelbrecht, “A Color Image Quantization Algorithm Based on Particle Swarm Optimization,” Informatica, pp. 261–269, February 2005. [15]F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, “Information Hiding-A Survey,”Proceeding of the IEEE,Vol.87,No.7,July 1999.,pp.1062-1078. [16]B. Pfitzmann, “Information Hiding Terminology, ”Proceeding of the first workshop on Information Hiding,Lecture Notes in Computer Science,Springer-Verlag,Berlin,Cambridge,UK,pp.347-350. [17]Yuhua Qin, “The Realization of Information Hiding in BMP Images,” Second International Workshop on Computer Science and Engineering,Vol.2, pp.49-53, Oct 2009. [18]Xiaoping Qin and Shijue Zheng, “A New Method for Initialising the K-Means Clustering Algorithm,” Second International Symposium on Knowledge Acquisition and Modeling,Vol.2, pp.41-44. Dec 2009. [19]M.S. Al Rababaa, “Colored image-in-image hiding,” International Conference - The Experience of Designing and Application of CAD Systems in Microelectronics, pp.445-450, Feb 2009. [20]K.B. Raja, S. Siddaraju, K.R. Venugopal, and L.M. Patnaik, “Secure Steganography using Colour Palette Decomposition,” International Conference on Signal Processing, Communications and Networking, pp.74-81, Feb 2007. [21]A. Rekik, M. Zribi, M. Benjelloun, and A. Ben Hamida, “A k-Means Clustering Algorithm Initialization for Unsupervised Statistical Satellite Image Segmentation,” IEEE International Conference on E-Learning in Industrial Electronics, pp.11-16, Dec 2006. [22]R. Ridzon, and D. Levicky, “Usage of different color models in robust digital watermarking,” International Conference on Radioelektronika, pp.127-130, April 2009. [23]N.A. Saleh, H.N. Boghdady, S.I. Shaheen, and A.M. Darwish, “An Efficient Lossless Data Hiding Technique for Palette-Based Images with Capacity Optimization,” International Workshop on Systems, Signals and Image Processing, pp.241-244, June 2007. [24]S.G.K. Samaratunge, “New steganography technique for palette based images,” International Conference on Industrial and Information Systems, pp.335-340, Aug 2007. [25]Tsu-Wang Shen Xavier Kuo and Yue-Loong Hsin, “Ant K-Means Clustering Method on Epileptic Spike Detection,” International Conference on Natural Computation(ICNC), pp.334-338, Aug 2009. [26]T.C. Thanuja, and U. Kumari, “Invertible Data Hiding in Color Images Using Multiple Peaks Histogram,” International Conference on Signal Processing Systems, pp.52-55, May 2009. [27]Ching-Te Wang Chiu-Hsiung Liao and Ruey-Maw Chen,“High Capacity Image Data Hiding Scheme for Grouping Palette Index,” International Conference on Multimedia and Ubiquitous Engineering, pp.197-204, June 2009. [28]Hui-qin Wang Ji-chao Hao and Fu-ming Cui,“Colour Image Watermarking Algorithm Based on the Arnold Transform,” International Conference on Communications and Mobile Computing (CMC), Vol.1, pp.66-69, April 2010. [29]G.A. Wilkin, and Xiuzhen Huang,“K-Means Clustering Algorithms: Implementation and Comparison,” International Multi-Symposiums on Computer and Computational Sciences, pp.133-136, Aug 2007. [30]Qing Xie Jianquan Xie and Yunhua Xiao,“A High Capacity Information Hiding Algorithm in Color Image,” International Conference on e-Business and Information System Security (EBISS), pp.1-4, May 2010. [31]Wei Yan Yihong Hu Guochu Shou and Zongjue Qian,“The Algorithm of Color Image Watermarking Based on SIFT,” International Conference on e-Business and Information System Security (EBISS), pp.1-4, May 2010.
|