|
[ARTZ01]D. Artz, “Digital Steganographic: Hiding data within data,” IEEE Internet Comput., Vol. 5, pp. 75–80 2001. [CHAN04A]C.K. Chan, L.M. Chen, “Hiding data in images by simple LSB substitution,” Pattern Recognition, Vol. 37-3, pp. 469–474 2004. [CHAN02]C.C. Chang, K.F. Hwang, M.S. Hwang, “Robust authentication scheme for protecting copyrights of images and graphics,” IEEE Proceedings on Vision, Image and Signal Processing Vol. 149, No. 1. 2002. [CHAN03]C.C. Chang, J.Y. Hsiao, C.S. Chan, “Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy,” Pattern Recognition, Vol. 36-7, pp. 1583–1595 2003. [CHAN04B]C.C. Chang, W.H. Tseng, “A steganographic method for digital images using side match,” Pattern Recognition Letters, Vol. 25, pp. 1434–1437 2004. [CHAN06]C.C. Chang, C.Y. Lin, Wang, Y.Z., “New image Steganographic methods using run-length approach,” Information Sciences, Vol. 176, No. 22, pp. 3393-3408 2006. [CHAN04C]C.K. Chan, L.M. Chen, “Hiding data in images by simple LSB substitution,” Pattern Recognition, Vol. 37-3, pp. 469–474 2004. [COX97]I.J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Process., Vol. 6, pp. 1673–1687 1997. [COX00]I.J. Cox, M.L. Miller, J.A. Boom, “Watermarking applications and their properties,” Proc. Internat. Conf. on Information Technology: Coding and Computing, pp. 6–10 2000. [COX01]I.J. Cox, J.A. Bloom, M.L. Miller, “Digital watermarking: principles & practice,” 2001. [FRID98]J. Fridrich, 1998. Image watermarking for tamper detection. Proc. IEEE Internat. Conf. on Image Processing, Vol. II, pp. 404–408. [FRID00]J. Fridrich, D. Rui, “Secure steganographic methods for palette images,” Proc. Third Internat. Workshop Information Hiding, Lecture Notes in Computer Science, Vol. 1768, pp. 61–76 2000. [FIRD01]J. Fridrich, M. Goljan, R. Du, “Detecting LSB steganography in color, and gray-scale images,” IEEE Multimedia, Vol. 8, 22–28 2001. [FRID02]J. Fridrich, M. Goljan, “Practical steganalysis of digital images-state of the art,” Proc. SPIE Photonics West, Conference on Security and Watermarking of Multimedia Contents, Vol. 4675, pp. 1–13 2002. [HART99]F. Hartung, M. Kutter, “Multimedia watermarking techniques,” Proc. IEEE, Vol. 87, pp. 1079–1107 1999. [LEE00]Y.K. Lee, L.H. Chen, “High capacity image steganography,” IEE Proceedings on Vision Image, and Signal Processing, Vol. 147, pp. 288–294 2000. [LIE99]W.N. Lie, L.C. Chang, “Data hiding in images with adaptive numbers of least significant bits based on the human visual system,” Proc. IEEE Internat. Conf. Image Process, Vol. 1, pp. 286–290 1999. [PETI99]F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn, "Information hiding-a survey," Proceedings of the IEEE, vol. 87, pp. 1062-1078 1999. [SWAN98]M.D. Swanson, M. Kobayashi, A.H. Tewfik, ”Multimedia data-embedding and watermarking technologies,” Proc. IEEE, Vol. 86, pp. 1064–1087 1998. [TSEN04]H. Tseng and C. Chang, “High capacity data hiding in JPEG-compressed images,” Informatica, vol. 15, pp. 127–142 2004. [VOYA99]G. Voyatzis, I. Pitas, “The use of watermarks in the protection of digital multimedia products,” Proc. IEEE, Vol. 87, pp. 1197–1207 1999. [WANG00]R.Z. Wang, C.F. Lin, J.C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, Vol. 11-3, pp. 71–683 2000. [WEST00]A. Westfeld, A. Pfitzmann, “Attacks on steganography systems,” Proc. Third Internat. Workshop Information Hiding,” Lecture Notes in Computer Science, Vol. 1768, pp. 61–75 2000. [WOLF99]R.B. Wolfgang, C.I. Podilchuk, E.J. Delp, “Perceptual watermarks for digital images and video,” Proc. IEEE, Vol. 87, pp. 1108–1126 1999. [WU03] D.C. Wu, W.H. Tsai, ”A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters, Vol. 24, pp. 1613–1626 2003. [XUAN02]G. Xuan, J. Zhu, J. Chen, Y.Q. Shi, Z. Ni, and W. Su, “Distortionless data hiding based on integer wavelet transform,” Electron. Lett., vol. 38, pp. 1646–1648 2002. [YANG06A]C.H. Yang, S.J. Wang, “Weighted bipartite graph for locating optimal LSB substitution for secret embedding,” Journal of Discrete Mathematical Sciences & Cryptography, Vol. 9-1, pp. 153–164 2006. [YANG06B] C.H. Yang, C.Y. Weng, “A steganographic method for digital images by multi-pixel differencing,” International Computer Symposium 2006, pp. 831–836 2006.
|