|
[Aliz2000] A.A. Alizadeh et al., “Distinct types of diffuse large B-cell lymphoma identified by gene expression profiling,” Nature, Vol. 403, 503-511, 2000. [Alon1999] U. Alon et al., “Broad Patterns of Gene Expression Revealed by Clustering Analysis of Tumor and Normal Colon Tissues Probed by Oligonucleotide Arrays,” Proceedings of the National Academy of Sciences of the United States of America, Vol. 96, No. 12, 6475- 6750, 1999. [Cham2014] B.S. Champakamala, D. Padmini, and D.K. Radhika. “Least Significant Bit algorithm for image steganography,” International Journal of Advanced Computer Technology, Vol. 3, No. 4, 34-38, 2014. [Chan2004] C.K. Chan and L.M. Cheng, “Hiding Data in Images By Simple LSB Substitution,” Pattern Recognition, Vol. 37, No. 3, 469-474, 2004. [Chen2006] C.C. Chen, C.Y. Kao, C.F. Chang, H.T. Chu, and C.N. Chen, “Simple Software for Microarray Image Analysis,” IEEE Proceedings of Computer and Robot Vision , Pid163-, Quebec city, Canada, June 7-9, 2006. [Chen2014] C.C. Chen and W.J. Lai, “High-Capacity Steganography Using MRF-Synthesized Cover Images,” Annual Conference on Engineering and Information Technology, 237-242, Chiyoda, Japan, March 28-30, 2014. [Kana2015] K. Kanagi, “Steganography Based on Color Images Using Advanced Encryption Standard (AES)”, M.S Thesis, National Tsing Hua University, Hsinchu, Taiwan, June, 2015. [Liu2008] C.L. Liu and S.R. Liao, “High-Performance JPEG Steganography Using Complementary Embedding Strategy,” Pattern Recognition, Vol. 41, No. 9, 2945-2955, 2008. [Mork2005] T. Morkel, J.H.P. Eloff, and M. S. Olivier. “An overview of image steganography,” Information Security, 1-11, Pretoria, South Africa, 2005. [Stin2006] D.R. Stinson, “Cryptography Theory and Practice,” 3rd. ed., Chapman & Hall/CRC, 2006. [Tsen2014] C.T. Tseng, “Steganography Based on Color Images”, M.S Thesis, National Tsing Hua University, Hsinchu, Taiwan, March, 2014. [Youn2008] M.A.B. Younes, and A. Jantan. “A New Steganography Approach for Images Encryption Exchange by Using the Least Significant Bit Insertion,” International Journal of Computer Science and Network Security, Vol. 8, No. 6, 247-257, 2008. [Ziel2014] E. Zielińska, W. Mazurczyk, and K. Szczypiorski. “Trends in steganography,” Communications of the ACM, Vol.57, No. 3, 86-95, 2014. [Web01] http://en.wikipedia.org/wiki/Steganography, last access on 5/27/2016. [Web02] http://en.wikipedia.org/wiki/Hill_cipher, last access on 5/27/2016. [Web03] http://en.wikipedia.org/wiki/Least_significant_bit, last access on 5/27/2016. [Web04] http://www.cs.nthu.edu.tw/∼cchen/Textdata/falls.txt, last access on 5/27/2016. [Web05] http://www.cs.nthu.edu.tw/∼cchen/IMQA2016, last access on 5/27/2016. [Web06] https://en.wikipedia.org/wiki/Peak_signal-to-noise_ratio, last access on 5/27/2016. [Web07] http://wiki.tesnexus.com/index.php?title=File:Ascii-codes-table.png, last access on 5/27/2016.
|