|
[1] C. E. Shannon, ``A mathematical theory of communication,' Bell Syst. Tech. J., vol. 27, pp. 379-423, 623-656, Jul./Oct. 1948.
[2] S. Lin and D.J. Costello , Error Control Coding Fundamentals and Applications. Englewood Cliffs, NJ: Prentice-Hall, 1983.
[3] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding—a survey,” Proc. IEEE, vol. 87, no. 6, pp. 1062–1078, Jul. 1999.
[4]R. Crandall. "Some notes on steganography". [Online], Available: http://os.inf.tu-dresden. de/westfeld/Crandall.pdf, 1998.
[5] D. Artz, ”Digital steganography: hiding data within data,” Internet Computing, IEEE, vol. 5, no. 3, pp. 75-80, May-June,
[6] J. Fridrich and D. Soukal, “Matrix embedding for large payloads,”IEEE Trans. Inf. Forensics Security, vol. 1, no.3, pp. 390–394, 2006.
[7] Jin-Yong Byun, Ki-Hyun Jung, Kee-Young Too,“Improve Data Hiding Method by Block Parity for Binary Images,”Computer Science and Software Engineering, vol. 3, pp. 931-934, 2008.
[8] Proakis, J. G. Digital Communications, 3rd ed., McGraw- Hill, New York, 1995.
[9] Ajetrao H., Kulkarni P.J.,“A Novel Scheme of Data Hiding in Binary Images,”Conference on Computational Intelligence and Multimedia Applications, vol. 4, pp. 70-77, 2007.
[10] J.-J. Wang, H. Chen, and C.-Y. Lin, “An adaptive matrix embedding technique for binary hiding with an efficient LIAE algorithm,” World Scientific and Engineering Academy and Society (WSEAS), vol. 8, issue 2, Apr. 2012.
[11]H. Rifa-Pous, J. Rifa. "Product perfect codes and steganography". Digital Signal Processing, 2009, 19(4):764-769.
[12] C. Wang, W. Zhang, J. Liu, and N. Yu,“Fast Matrix Embedding by Matrix Extending,” IEEE Trans. Inf. Theory, vo7. 1, no. 1, pp. 346–350, Feb. 2012
[13] P. Moulin and R. Koetter, ““Data-hiding codes,” (tutorial paper),”Proc.IEEE, vol. 93, no. 12, pp. 2083–2127, Dec. 2005
[14] Chin-Chen Chang, The Duc Kieu, Yung-Chen Chou, “A High Payload Steganographic Scheme Based on (7,4) Hamming Code for Digital Images ,”Electronic Commerce and Security, pp. 16-21, 2008.
[15] J.Y. Byun, K.H. Jung and K.Y. Yoo,”Improved Data Hiding Method by Block Parity for Binary Images” Computer Science and Software Engineering, vol. 3, pp. 931 - 934, 2008.
[16]W. Zhang, S. Wang, and X. Zhang, “Improving embedding efficiency of covering codes for applications in steganography,” IEEE Commun. Lett., vol. 11, pp. 680–682, Aug. 2007.
[17] Atta-ur-rahman, S.A. Ghouri, H. Adeel, A. Waheed, “Performance of Iterative Decoding Algotihm for Product Code”. Proceedings of International Conference on Computational Aspects of Social Networks (CASON), Oct. 2011
[18] N. Y. Yu, Y. Kim, and P. J. Lee, “Iterative decoding of product codes composed of extended hamming codes,” in Proc. ISCC, pp. 732–737, 2000.
|