|
[1]R. J. Anderson, and F. A. P. Petitcolas, 1998. “On the limits of steganography,” IEEE Journal on Selected Areas in Communications, Vol. 16, pp. 474-481. [2]S. Katzenbeisser, and F. A. P. Petitcolas, 2000. Information hiding techniques for steganography and digital watermarking, Artech House. [3]C. C. Chang, K. F. Hwang, and M. S. Hwang, 2002. “Robust authentication scheme for protecting copyrights of images and graphics,” IEE Proceedings on Vision, Image and Signal Processing, Vol. 149, No. 1, pp. 43-50. [4]N. Nikolaidis, and I. Pitas, 1998. “Robust image watermarking in the spatial domain,” Signal Process, Vol. 66, pp. 385-403. [5]J. J. K. O'Ruanaidh, W. J. Dowling, and F. M. Boland, 1996. “Watermarking digital images for copyright protection,” IEE Proceedings on Vision, Image and Signal Processing, Vol. 143, No. 4, pp. 250-256. [6]C. I. Podilchuk, and E. J. Delp, 2001. “Digital watermarking: algorithms and applications,” IEEE Signal Process, Vol. 18, No. 4, pp. 33-46. [7]J. Fridrich, 1998. “Image watermarking for tamper detection,” Proceedings of IEEE International Conference on Image Processing, Chicago, Illinois, pp. 404-408. [8]C. S. Lu, and H. Y. M. Liao, 2001. “Multipurpose watermarking for image authentication and protection,” IEEE Transactions on Image Processing, Vol. 10, No. 10, pp. 1579-1592. [9]W. Bender, D. Gruhl, N. Morimoto, and A. Lu, 1996. “Techniques for data hiding,” IBM Systems Journal, Vol. 35, No.3&4, pp. 313-336. [10]R. Z. Wang, C. F. Lin, and J. C. Lin, 2001. “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, Vol. 34, pp. 671-683. [11]C. C. Chang, and H. W. Tseng, 2004. “A steganographic method for digital Images using side-match,” Pattern Recognition Letters, Vol. 25, pp. 1431-1437. [12]W. N. Lie, and L. C. Chang, , 1999. “Data hiding in images with adaptive numbers of least significant bits based on the human visual system,” Proceedings of IEEE International Conference on Image Processing, Kobe, Japan, pp. 286-290. [13]D. C. Wu, and W. H. Tsai, 2003. “A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters, Vol. 24, pp. 1613-1626. [14]R. C. Gonzalez, and R. E. Woods, 2002. Digital image processing, Prentice Hall. [15]A. Gersho and R. M. Gray, 1992. Vector Quantization and Signal Compression, Kluwer Academic Publishers. [16]R. M. Gray, 1984. “Vector Quantization,” IEEE ASSP Magazine, pp. 4-29. [17]Y. C. Lin and C. C. Wang, 1999. “Digital images watermarking by vector quantization,” National Computer Symposium,Vol. 3, pp. 76-87. [18]Z. M. Lu and S. H. Sun, 2000. “Digital image watermarking technique based on vector quantization,” Electronics Letters, Vol. 36, pp. 303-305. [19]W. C. Du and W. J. Hsu, 2003. “Adaptive data hiding based on VQ compressed images,” IEE Proceedings-Vision, Image and Signal Processing, Vol. 150, No. 4, pp. 233-238. [20]M. Ujjwal and B. Sanghamitra, 2000. “Genetic Algorithm-Based Clustering Technique,” Pattern Recognition, Vol. 33, No. 9, pp. 1455-1465. [21]Z. Michalewicz, 1996. Genetic Algorithms + Data Structures = Evolution Programs,3 ed: Springer Verlag. [22]C. C. Chang, D. C. Lin, and T. S. Chen, 1997. “An improved VQ codebook search algorithm using principal component analysis,” Journal of Visual Communication and Image Representation, Vol. 8, No. 1, pp. 27-37. [23]R. C. T. Lee, Y. H. Chin, and S. C. Chang, 1976. “Application of Principal Component Analysis to Multikey Searching,” IEEE Transactions on Software Engineering, Vol. SE-2, No. 3, pp. 185-193. [24]Y. Linde, A. Buzo, and R. M. Gary, 1980. “An Algorithm for Vector Quantization Design,” IEEE Transactions on Communications, Vol. 28, pp. 84-95. [25]M. Kwan, 1998. GIF colormap steganography. [Online]. Available: http://www.darkside.com.au/gifshuffle/ [26]J. Fridrich and R. Du, 1999. “Secure steganographic method for palette images,” Proceedings of the Third International Workshop Information Hiding, Dresden, Germany, pp. 47-60. [27]C. C. Chang, P. Y. Tsai, and M. H. Lin, 2004. “An Adaptive Steganography for Index-Based Images Using Codeword,” Advances in Multimedia Information Processing – PCM 2004, (Aizawa, K., Nakamura, Y. and Satoh, S. Eds.), Springer Verlag, Part III, Germany, pp. 731-738. [28]C. H. Tzeng, Z. F. Yang and W. H. Tsai, 2004. “Adaptive data hiding in palette images by color ordering and mapping with security protection,” IEEE Transactions on Communications, Vol. 52, No. 4, pp. 791-800.
|