|
[1] M. E. Smid, and D. K. Branstad, “Data Encryption Standard: past and future,” Proceedings of the IEEE, Vol. 76, no. 5, May 1988, pp. 550-559. [2] A. Sinha and K. Singh, “A Technique for Image Encryption Using Digital Signature,” Optics Communications, April 2003, Vol. 218, Issue 4-6, pp. 229–234. [3] W. C. Kuo, and M. Y. Chen, “A Modified (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem,” Information Technology and Applications, Vol. 2, December 2005, pp. 576-579. [4] R. J. Anderson, and, F. A. P. Petitcolas, “On the Limits of Steganography,” IEEE Journal on Selected Areas in Communications, Vol. 16, no. 4, May 1998,pp. 474-481. [5] R. Z. Wang and Y. S. Chen, “High-payload Image Steganography Using Two-way Block Matching,” IEEE Signal Processing Letters, March 2006, Vol. 13, Issue 3, pp.161–164. [6] R. Z. Wang and Y. D. Tsai, “An Image-hiding Method with High Hiding Capacity Based on Best-block Matching and K-means Clustering,” Pattern Recognition, Feb. 2007, Vol. 40, Issue 2, pp. 398–409. [7] F. Hartung and M. Kutter, “Multimedia Watermarking Techniques,” Proceedings of the IEEE, 1999, Vol. 87, No. 7, pp. 1079–1107. [8] G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, “Watermarking Digital Image and Video Data. A State-of-the-art Overview,” IEEE Signal Processing Magazine, 2000, Vol. 17, No. 5, pp. 20–46. [9] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information Hiding – a survey,” Proceedings of the IEEE, 1999, Vol. 87, No. 7, pp. 1062–1078. [10] F. Y. Shih and Y. T. Wu, “Robust Watermarking and Compression for Medical Images Based on Genetic Algorithms,” Information Sciences, Oct. 2005, Vol. 175, Issue 3, pp. 200–216. [11] J. L. Liu, D. C. Lou, M. C. Chang, and H. K. Tso , “A Robust Watermarking Scheme Using Self-reference Image,” Computer Standards & Interfaces, January 2006, Vol. 28, Issue 3, pp. 356–367. [12] S. P. Maity, M. K. Kundu, and T. S. Das , “Robust SS Watermarking with Improved Capacity,” Pattern Recognition Letters, Feb. 2007, Vol. 28, Issue 3, pp. 350–356 [13] D. Yu, F. Sattar, and B. Barkat, “Multiresolution Fragile Watermarking Using Complex Chirp Signals for Content Authentication,” Pattern Recognition, May 2006, Vol. 39, Issue 5, pp. 935–952. [14] S. H. Liu, H. X. Yao, W. Gao, and Y. L. Liu, “An Image Fragile Watermark Scheme Based on Chaotic Image Pattern and Pixel-pairs,” Applied Mathematics and Computation, Feb. 2007, Vol. 185, Issue 2, pp. 869–882. [15] S. Suthaharan, “Fragile Image Watermarking Using a Gradient Image for Improved Localization and Security,” Pattern Recognition Letters, Dec. 2004, Vol.25, Issue 16, pp. 1893–1903. [16] D. Kundur and D. Hanzinakos, “Towards a Telltale Watermarking Technique for Tamper-proofing,” Proceedings of IEEE International Conference on Image Processing, Oct. 1998, Vol. 2, pp. 409–413. [17] G. J. Simmons, “The Prisoner''s Problem and the Subliminal Channel. “ In Proceedings of Crypto ''83, 1983, pp. 51-67. [18] C. C. Chang, J. C. Chuang, and Y. P. Lai, “Hiding Data in Multitone Images for Data Communications,” IEE Proceedings of Image and Signal Processing, 2004, Vol. 151, No. 2, pp. 137–145. [19] S. J. Wang, “Steganography of Capacity Required Using Modulo Operator for Embedding Secret Image,” Applied Mathematics and Computation, May 2005, Vol. 164, Issue 1, pp. 99–116. [20] C. H. Yang, C. Y. Weng, S. J. Wang, and H. M. Sun, “Adaptive Data Hiding in Edge Areas of Images with Spatial Domain System,” IEEE Transactions on Information Forensics and Security, 2008, Vol. 3, Issue 3, pp. 488–497. [21] P. L. Lin, “Robust Transparent Image Watermarking System with Spatial Mechanisms,” Journal of Systems and Software, 2000, Vol. 50, No. 2, pp. 107–116. [22] S. L. Li, K. C. Leung, L. M. Cheng, and C. K. Chan, “A Novel image-hiding Scheme Based on Block Difference,” Pattern Recognition, 2006, Vol. 39, No. 6, pp. 1168–1176. [23] J. J. Liaw, Y. S. Liao, and L. H. Chang, “Improvements of Blind Data Hiding Scheme in Digital Images Based on Self-reference for Lossy Compression,” WSEAS Transactions on Computers, May 2007, Vol. 6, Issue 5, pp.779-784. [24] J. Fridrich, M. Goljan, and R. Du, “Detecting LSB Steganography in Color and Gray-scale Images,” IEEE Multimedia, 2001, Vol. 8, No. 4, pp. 22–28. [25] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless Generalized-LSB Data Embedding,” IEEE Transactions on Image Processing, 2005, Vol. 14, No. 2, pp. 253–266. [26] C. K. Chan, and L. M. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Pattern Recognition, Vol. 37, no. 3, March 2004, pp. 469–474. [27] D. C. Lou, H. K Tso, and J. L. Liu, “A Copyright Protection Scheme for Digital Images Using Visual Cryptography Technique,” Computer Standards & Interfaces, 2007, Vol. 29, No.1, pp. 125–131. [28] F. Y. Shih and S. Y. T. Wu, “Combinational Image Watermarking in the Spatial and Frequency Domains,” Pattern Recognition, Apr. 2003, Vol. 36, Issue 4, pp. 969–975. [29] J. Haung, Y. Q. Shi, and Y. Shi, “Embedding Image Watermarks in DC Components,” IEEE Transactions on circuits and systems for video technology, Sep. 2000, Vol. 10, No. 6, pp. 974–979. [30] C. C. Chang, and H. W. Tseng, “Data Hiding in Images by Hybrid LSB Substitution,” Third International Conference on Multimedia and Ubiquitous Engineering, June 2009, pp. 360–366. [31] C. C. Chang, J. Y. Hsiao, and C. S. Chan, “Finding Optimal Least Significant Bit Substitution in Image Hiding by Dynamic Programming Strategy,” Pattern Recognition, Vol. 36, no. 7, July, 2003, pp. 1583–1595. [32] C. C. Thien and J. C. Lin, “A Simple and High-hiding Capacity Method for Hiding Digit-by-digit Data in Images Based on Modulus function,” Pattern Recognition, Dec. 2003, Vol. 36, Issue 12, pp. 2875–2881. [33] C. C. Chang, Y. S. Hu, and T. Z. Lu, “A Watermarking-based Image Ownership and Tampering Authentication Scheme,” Pattern Recognition Letters, Apr. 2006, Vol. 27, Issue 5, pp. 439–446 [34] D. C. Wu and W. H. Tsai, “A Steganographic Method for Images by Pixel-value differencing,” Pattern Recognition Letters, Jun. 2003, Vol. 24, Issue 9-10, pp. 1613–1626. [35] H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, “Image Steganographic Scheme Based on Pixel-value Differencing and LSB Replacement Methods,” IEE Proceedings: Vision, Image and Signal Processing, Oct. 2005, Vol. 152, Issue 5, pp. 611–615.
|