|
[1] C. T. Wang and W. H. Tsai, “Data hiding in PDF files and applications by Imperceivable modifications of PDF object parameters,” Proceedings of 2008 Conference on Computer Vision, Ilan, Taiwan, Aug. 2008. [2] L. Y. Weng and W. H. Tsai, “Integrity authentication of grayscale document images surviving print-and-scan attacks,” Proceedings of 2005 Conference on Computer Vision, Graphics and Image Processing, Taipei, Taiwan, June 2005. [3] P. M. Huang and W. H. Tsai, “Copyright protection and authentication of grayscale images by removable visible watermarking and invisible signal embedding techniques: a new approach,” Proceedings of 2003 Conference on Computer Vision, Graphics and Image Processing, Kinmen, Taiwan, pp. 276-283, 2003. [4] Y. C. Chiu and W. H. Tsai, “Copyright protection by watermarking for Color Images against Rotation and Scaling Attacks Using Peak Detection and Synchronization in Discrete Fourier Transform Domain,” Proceedings of Third Workshop on Digital Archives Technologies, Taipei, Taiwan, pp. 207-213, Aug. 2004. [5] I. S. Lee and W. H. Tsai "Security protection of software programs by information sharing and authentication techniques using invisible ASCII control codes," International Journal of Network Security, vol. 10, no. 1, pp. 1-10, Jan. 2010. [6] C. C. Lin and W. H. Tsai “Secret image sharing with steganography and authentication,” Journal of Systems & Software, vol. 73, no. 3, pp. 405-414, Nov.-Dec. 2004. [7] A. Shamir, “How to share a secret,” Communications of Association for Computing Machinery , vol. 22, no. 11, pp. 612- 613, Nov. 1979. [8] G. R. Blakley, “Safeguarding cryptographic keys,” Proceedings of the National Computer Conference, New York, U. S. A., pp. 313–317, 1979. [9] C. C. Lin and W. H. Tsai, “Secret multimedia information sharing with data hiding capacity by simple logic operations,” Proceedings of 5th World Multiconference on Systemics, Cybernetics, and Informatics, Vol. I: Information Systems Development, Orlando, Florida, U. S. A., pp. 50-55, July 2004. [10] Cramer, et al., “On codes, matroids, and secure multiparty computation from linear secret-sharing schemes”, IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2644-2657, June 2008. [11] I. S. Lee and W. H. Tsai, "Data hiding in grayscale images by dynamic programming based on a human visual model," Pattern Recognition, vol. 42, no. 7, pp. 1604-1611, July 2009. [12] C. H. Lai and W. H. Tsai, “Data hiding by stacking up two PNG images,” Technical Report, Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan, June 2007. [13] Ni, et al., “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362, Mar. 2006 [14] T. Y. Liu and W. H. Tsai “Robust watermarking in slides of presentations by blank space coloring: a new approach,” accepted and to appear in LNCS Transactions on Data Hiding and Multimedia Security, 2009. [15] T. Y. Liu and W. H. Tsai "A new steganographic method for data hiding in Microsoft Word documents by a change tracking technique," IEEE Transactions on Information Forensics and Security, vol. 2, no. 1, pp. 24-30, Mar. 2007. [16] I. S. Lee and W. H. Tsai "Data hiding in binary images with distortion-minimizing capabilities by optimal block pattern coding and dynamic programming techniques," IEICE Transactions on Information and Systems, vol. E90-D, no. 8, pp. 1142-1150., July 2007. [17] J. Jiang and A. Armstrong “Data hiding approach for efficient image indexing,” IEE Electronics Letters, vol. 38, no. 23, pp.1424-1425, Nov. 2002.
|