|
[1]A. Cheddad, J. Condell, K. Curran, and P.M. Kevitt, “Digital Image Steganography: Survey and Analysis of Current Methods,” Signal Processing, vol. 90, no. 3, pp. 727-752, 2010 [2]C.C Chang, J.Y.Hsiao, and C.S. Chan, “Finding Optimal Least-Significant-Bit Substitution in Image Hiding by Dynamic Programming Strategy,” Pattern Recognition, vol. 36, on. 7, pp.1583-1595, 2003. [3]C.H. Yang, C.Y. Weng, S.J. Wang, H.M. Sun, “Adaptive Data Hiding in Edge Areas of Image with Spatial LSB Domain Systems,” IEEE Transactions on Information Forensics and Security vol. 3, no. 3, pp.488-497, 2008. [4]C.K. Chan, and L.M. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Pattern Recognition, vol. 37, no. 3, pp. 469-474, 2004. [5]C.M. Wang, N.I Wu, C.S Tsai, and M.S. Hwang, “A High Quality Steganographic Method with Pixel-Value Differencing and Modulus Function,” Journal of Systems and Software, vol. 81, on. 1, pp.150-158, 2008. [6]D.C. Lou, N.I. Wu, C.M. Wang, Z.H. Lin, C.S. Tsai, “A Novel Adaptive Steganography Based on Local Complexity and Human Vision Sensitivity,” Journal of Systems and Software, vol. 83 pp.1236-1248 [7]D.C Wu and W.H. Tsai, “A Stegoanographic Method for Images by Pixel-Value Differencing,” Pattern Recognition Letters, vol. 24,pp.1613-1626, 2003 [8]J. Mielikainen, “LSB Matching Revisited,” IEEE Signal Processing Letters, vol. 13, on. 5, pp.285-287, 2006. [9]N. Provos, and P. Honeyman, “Hide and Seek: An Introduction to Steganography,” IEEE Security and Privacy Magazine, vol. 1, no. 3, pp. 32-44, 2003. [10]P. Fabien, A.R.J. Anderson, and M.G. Kuhn, “Information Hiding-A Survey, ”Proceedings of IEEE, Vol. 87, No. 7, Jul. 1999, pp. 1062-1078 [11]R.M. Chao, H.C. Wu, C.C. Lee, and Y.P. Chu, “A Novel Image Data Scheme with Diamond Encoding,” EURASIP Journal on Information Security.doi:10.1155/2009/658047,Article ID 658047. [12]R.Z. Wang, C.F. Lin, and J.C. Lin, “Image Hiding by Optimeal LSB Substitution and Genetic Algorithm, ”Pattern Recognition, vol. 34, pp. 671-683, 2001. [13]W. Hong, T.S. Chen, and C.W. Shiu, “A Minimal Euclidean Distance Searching Technique for Sudoku Steganography,” in Proceedings of International Symposium on Information Science and Engineering, vol. 1, pp. 515-518, 2008. [14]X. Zhang and S. Wang, “Efficient Steganographic Embedding by Exploiting Modification Direction,” IEEE Communications Letters, vol. 10, no. 11, pp. 781-783, 2006. [15]X. Zhang, and S. Wang, “Steganography Using Multiple-Base Notational System and Human Vision Sensitivity,” IEEE Signal Processing Letters vol. 12, no. 1, pp.67-70, 2005.
|