|
[1]Petitcolas, F. A. P., Anderson, R. J., and Kuhn, M. G., “Information Hiding-A Survey,” Proceedings of the IEEE, Vol. 87, No. 7, pp. 1062-1078, 1999. [2]Rabah, K., “Steganography-The Art of Hiding Data,” Information Technology Journal, Vol. 3, No. 3, pp. 245-269, 2004. [3]Shih, F. Y. and Wu, Scott. Y. T., “Combinational Image Water Marking in the Spatial and Frequency Domains,” Pattern Recognition, Vol. 36, No. 4, pp. 969-975, Apr. 2003. [4]Chang, C. C., Chen, T. S., and Chung, L. Z., “A Steganographic Method Based upon JPEG and Quantization Table Modification,” Information Sciences, Vol. 141, No. 1-2, pp. 123-138, 2002. [5]Joo, S., Suh, Y., Shin, J., and Kikuchi, H., “A New Robust Watermark Embedding into Wavelet DC Components,” ETRI Journal, Vol. 24, No. 5, pp. 401-404, 2002. [6]Lee, W. B. and Chen, T. H., “A Public Verifiable Copy Protection Technique for Still Images,” Journal of Systems and Software, Vol. 62, No. 3, pp. 195-204, 2002. [7]Alturki, F. and Mersereau, R., “Secure Blind Image Steganographic Technique Using Discrete Fourier Transformation,” Proceedings of IEEE International Conference on Image Processing, Thessaloniki, pp. 542-545, 2001. [8]Bender, W., Gruhl, D., Morimoto, N., and Lu, A., “Techniques for Data Hiding,” IBM Systems Journal, Vol. 35, No. 3-4, pp. 313-336, 1996. [9]Fridrich, J., Goljan, M., and Rui, D., “Detecting LSB Steganography in Color, and Gray-scale Images,” Magazine of IEEE Multimedia Special Issue on Security, Vol. 4, No. 4, pp. 22-28, 2001. [10]Westfeld, A. and Pfitzmann, A., “Attacks on Steganographic Systems,” Proceedings of the Third International Workshop on Information Hiding, Dresden, Germany, pp. 61-75, 1999. [11]Chang, C. C., Hsiao, J. Y., and Chan, C. S., “Finding Optimal Least-Significant-Bit Substitution in Image Hiding by Dynamic Programming Strategy,” Pattern Recognition, Vol. 36, No. 7, pp. 1583-1595, 2003. [12]Mielikeainen, J., “LSB Matching Revisited,” IEEE Signal Processing Letters, Vol. 13, No. 5, pp. 285-287, 2006. [13]Wu, D. C. and Tsai, W. H., “A Steganographic Method for Images by Pixel-Value Differencing,” Pattern Recognition Letters, Vol. 24, No. 9-10, pp. 1613-1626, 2003. [14]Wu, H. C., Wu, N. I, Tsai, C. S., and Hwang, M. S., “Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods,” IEEE Proceedings on Vision, Image and Signal Processing, Vol. 152, No. 5, pp. 611-615, 2005. [15]Kim, K. J., Jung, K. H., and Yoo, K. Y., “A High Capacity Data Hiding Method Using PVD and LSB,” Proceedings of the 2008 International Conference on Computer Science and Software Engineering, Wuhan, Hubei, pp. 876-879, Dec. 2008. [16]Chang, K. C., Chang C. P., Huang, P. S., and Tu T. M., “A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing,” Journal of Multimedia, Vol. 3, No. 2, pp. 37-44, 2008. [17]Wang, C. M., Wu, N. I, Tsai, C. S., and Hwang M. S., “A High Quality Steganographic Method with Pixel-Value Differencing and Modulus Function,” Journal of Systems and Software, Vol. 81, No. 1, pp. 150-158, 2008. [18]http://zh.wikipedia.org/wiki/911%E4%BA%8B%E4%BB%B6#cite_note-35 [19]http://www.ettoday.net/news/20120502/43256.htm [20]Joo, J. C., Lee, H. Y., Bui, C. N., Yoo, W. Y., and Lee, H. K., “Steganalytic Measures for the Steganography Using Pixel-Value Differencing and Modulus Function,” Proceedings of the 9th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing, Tainan, Taiwan, pp. 476-485, 2008. [21]Joo, J. C., Kim, K. S., and Lee, H. K., “Histogram Estimation Scheme Based Steganalysis Defeating the Steganography Using Pixel-Value Differencing and Modulus Function,” Optical Engineering, Vol. 49, No. 7, pp. 1-11, 2010. [22]Sabeti, V., Samavi, S., Mahdavi, M., and Shirani, S., “Steganalysis and Payload Estimation of Embedding in Pixel Differences Using Neural Networks,” Pattern Recognition, Vol. 43, No. 1, pp. 405-415, 2010. [23]Zaker, N. and Hamzeh, A., “A Novel Steganalysis for TPVD Steganographic Method Based on Differences of Pixel Difference Histogram,” Multimedia Tools and Applications, DOI :10.1007/s11042-010-0714-9. [24]劉江龍、劉興漢、李翊豪,“適用於三向型像素值差異藏密法之偵密技術”,第二屆航空技術學術研討會,高雄,台灣,第221-228頁,2012年9月21日。 [25]劉江龍、李翊豪、劉興漢,“可偵測使用模數運算像素值差異藏密法之偵密技術”, 第 20 屆國防科技學術研討會,桃園,台灣,第631-637頁,2011年11月18日。 [26]郭琇靜、顧瑞祥,“應用支援向量機於管制圖異常圖形之辨識”, 中華民國品質學會第43 屆年會暨第13 屆全國品質管理研討會論文集,第1-10頁,2007。 [27]Andreani, R., Martínez, J. M., and Schuverdt, M. L., “On the Relation between Constant Positive Linear Dependence Condition and Quasinormality Constraint Qualification,” Journal of optimization theory and applications, Vol. 125, No. 2, pp. 473-485, 2005. [28]http://photogallery.nrcs.usda.gov/ [29]Pevny, T., Bas, P., and Fridrich, J., “Steganalysis by Subtractive Pixel Adjacency Matrix,” IEEE Transactions on Information Forensics and Security, Vol. 5, No. 2, pp. 215-224, 2010.
|