|
[1] F. Alturki and R. Mersereau, ”Secure blind image steganographic technique using discrete Fourier transformation,” IEEE Transactions on Image Processing, Vol. 2, 2001, pp. 542-545. [2] P.S.L.M. Barreto, H.Y. Kim, and V. Rijmen, ”Toward a Secure Pub-lic-key Blockwise Fragile Authentication Watermarking,” IEEE In-ternational Conference on Image Processing, Vol. 2, 2001, pp. 494-497. [3] F.L. Bauer, Decrypted Secrets – Methods and Maxims of Cryptology. Springer-Verlag, 1997. [4] L.H. Chen and J.J. Lin, “Mean Quantization Based Image Water-marking,” Image and Vision Computing, Vol. 21, Issue. 8, 2003, pp. 717-727. [5] J. Fridrich, ”Security of Fragile Authentication Watermarks with Lo-calization,” Proceedings of SPIE on Security and Watermarking of Multimedia Contents IV, Vol. 4675, 2002, pp. 691-700. [6] J. Fridrich, M. Goljan, and R. Du, “Steganalysis Based on JPEG Compatibility,” Proceedings of SPIE on Multimedia Systems and Applications IV, Vol. 4518, 2001, pp. 275-280. [7] M.S. Fu and O.C. Au, “Data Hiding Watermarking for Halftone Im-ages,” IEEE Transactions on Image Processing, Vol. 11, No. 4, 2002, pp. 477-484. [8] H.C. Huang, F.H. Wang, and J.S. Pan, ”A VQ-based Robust Multi-watermarking Algorithm,” IEICE Transactions on Fundamentals, Vol. E85-A, No. 7, 2002, pp. 1719-1726. [9] N.F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen,” IEEE Computer Magazine, Vol. 31, No. 2, 1998, pp. 26-34. [10] D. Kundur and D. Hatzinakos, ”Digital Watermarking Using Mul-tiresolution Wavelet Decomposition,” IEEE International Confer-ence on Acoustics, Speech, and Signal Processing, Vol. 5, 1998, pp. 2969-2972. [11] S.D. Lin and S.C. Shie, ”Improving Robustness of Visible Water-marking Schemes for Images,” IEEE International Symposium on Consumer Electronics, 2004, pp. 11-14. [12] C.C. Lin and W.H. Tsai, “Secret Image Sharing with Steganography and Authentication,” The Journal of Systems and Software, Vol. 73, No. 3, 2004, pp. 405-414. [13] T. Liu and Z.D. Qiu, ”A DWT-based Color Image Steganography Scheme,” IEEE International Conference on Signal Processing, Vol. 2, 2002, pp. 1568-1571. [14] D.C. Lou and J.L. Liu, “Steganographic Method for Secure Com-munications,” Computers and Security, Vol. 21, No. 5, 2002, pp. 449-460. [15] C.S. Lu, ”Dual Security-based Image Steganography,” IEEE Inter-national Conference on Multimedia and Expo, Vol. 2, 2003, pp. 489-492. [16] A. Lumini and D. Maio, ”Adaptive Positioning of a Visible Water-mark in a Digital Image,” IEEE International Conference on Multi-media and Expo, Vol. 2, 2004, pp. 967-970. [17] J. Meng and S.F. Chang, ”Embedding Visible Video Watermarks in the Compressed Domain,” International Conference on Image Proc-essing, Vol. 1, 1998, pp. 474-477. [18] E.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, ”Information Hid-ing – A Survey,” Proceedings of the IEEE, Vol. 87, No. 7, 1999, pp. 1062-1078. [19] B. Pfitzmann, ”Information Hiding Terminology,” Proceedings of the First International Workshop on Information Hiding, 1996, pp. 347-350. [20] G.J. Simmons, ”The Prisoners’ Problem and Subliminal Channel,” Proceedings of Crypto ’83, 1984. [21] Y. Wang and A. Pearmain, “Blind Image Data Hiding Based on Self Reference,” Pattern Recognition Letters, Vol. 25, Issue 15, 2004, pp.1681-1689. [22] A. Westfeld and A. Pfitzmann, “Attacks on Steganographic Sys-tems,” Proceedings of the Third International Workshop on Informa-tion Hiding, 1999, pp. 61-76. [23] H.W. Wong, O.C. Au, and Justy W. C. Wong, “A Data Hiding Tech-nique in JPEG Compressed Domain,” Proceedings of SPIE on Secu-rity and Watermarking of Multimedia Contents III, Vol. 4314, 2001, pp. 309-320. [24] M. Wu and B. Liu, ”Data Hiding in Binary Image for Authentication and Annotation,” IEEE Transactions on Multimedia, Vol. 6, Issue 4, 2004, pp. 528-538. [25] D.C. Wu and W.H. Tsai, “A Steganographic Method for Images by Pixel-value Differencing,” Pattern Recognition Letters, Vol. 24, Is-sue 9-10, 2003, pp.1613-1626.
|