|
[1] D. W. Bender, N. M. Gruhl and A. Lu, " Techniques for Data Hiding, " IBM Systems Journal, vol. 35, 1996, pp. 313-336. [2] M. U. Celik, G. Sharma, E. Saber and A. M. Tekalp, "Hierarchical Watermarking for Secure Image Authentication with Localization, " IEEE Transactions on Image Processing, vol. 11, no. 6, 2002, pp. 585-595. [3] C. K. Chan and L. M. Cheng, "Hiding Data in Images by Simple LSB Substitution, " Pattern Recognition, vol. 37, no. 3, March 2004, pp. 469-474. [4] C. S. Chan and C. C. Chang " An Image Hiding Scheme Based on Multi-bit-reference Substitution Table Using Dynamic Programming Strategy, " Fundamenta Informaticae, vol. 65, no. 4, 2005, pp. 291-305. [5] C. S. Chan and C. C. Chang " An Image Hiding Scheme by Finding an Optimal One-to-two Substitution Table Using Dynamic Programming Strategy, " submitted to Imaging Science Journal, March 2005. (Under Revision). [6] C. S. Chan, C. C. Chang, and Y. C. Hu, " A Color Image Hiding Scheme Using Image Differencing, " Optical Engineering, vol. 44, no. 1, 2005, pp. 017003-1-017003-9. [7] C. S. Chan, C. C. Chang, and Y. C. Hu, " Image Hiding Scheme Using Modulus Function and Optimal Substitution Table, " Pattern Recognition and Image Analysis, vol. 15, no. 4, 2005. [8] C. C. Chang and C. S. Chan, "A Watermarking Scheme Based on Principal Component Analysis Technique," Informatica, vol. 14, no. 4, 2003, pp. 431-444. [9] C. C. Chang, T. S. Chen and P. F. Chung, "A Technique of Watermarking for Digital Images Using (t,n)-Threshold Scheme, " Informatica, vol. 24, no. 1, 2000, pp. 51-55. [10] C. C. Chang, J. Y. Hsiao and C. S. Chan, " Finding Optimal LSB Substitution in Image Hiding by Dynamic Programming Strategy," Pattern Recognition, vol. 36, no. 7, 2003, pp. 1583-1595. [11] C. C. Chang, M. H. Lin, Min Hui, and Y. C. Hu, "A fast and secure image hiding scheme based on LSB substitution," International Journal of Pattern Recognition and Artificial Intelligence, vol. 16, no. 4, 2002, pp. 399-416. [12] C. C. Chang and C. S. Tsai, "A Technique for Computing Watermarks from Digital Images,". Informatica, vol. 24, no. 3, 2000, pp. 391-396. [13] L. H. Chen and J. J. Lin, "Mean Quantization Based Image Watermarking," Image and Vision Computing, vol. 21, no. 8, 2003, pp. 717-727. [14] Y. H. Chu and S. Chang, "Dynamical Cryptography Based on Synchronized Chaotic Systems," Electronics Letters, vol. 35, no. 12, 1999, pp. 974-975. [15] M. S. Fu and O. C. Au, " Halftone Image Data Hiding with Intensity Selection and Connection Selection, " Signal Processing: Image Communication, vol. 16, no. 10, August 2001, pp. 909-930. [16] M. S. Fu and O. C. Au, "Steganography in Halftone Images: Conjugate Error Diffusion," Signal Processing, vol. 83, no. 10, Oct. 2003, pp. 2171-2178. [17] H. J. Highland, "Data Encryption: a Non-mathematical Approach," Computer Security, vol. 16, 1997, pp. 369-386. [18] M. S. Hwang, C. C. Chang and K. F. Hwang, "A watermarking technique based on one-way hash functions," IEEE transactions on Consumer Electronics, vol. 45, no. 2, 1999, pp. 286-294. [19] R. C. T. Lee, Y. H. Chin and S. C. Chang, "Application of Principal Component Analysis to Multikey Searching," IEEE Transactions on Software Engineering, vol. SE-2, no. 3, Sep. 1976, pp185-193. [20] S. D. Lin and C. F. Chen, "A Robust DCT-based Watermarking for Copyright Protection, " IEEE Transactions on Consumer Electronics, vol. 46, no. 3, 2000, pp. 415-421. [21] Y. Linde, A. Buzo and R. M. Gray, "An Algorithm for Vector Quantizer Design," IEEE Transactions on communications, vol. 28, Sep. 1980, pp. 84-95. [22] S. S. Maniccam and N. Bourbakis, "Lossless Compression and Information Hiding in Images, " Pattern Recognition, vol. 37, no.3, Mach 2004, pp. 475-486. [23] L. M. Marvel, C. T. Retter, and C. G. J. Boncelet, "Hiding Information in Images", Proceedings of IEEE ICIP, vol. 2, 1998, pp. 396 –398. [24] S. C. Pei, and J. M. Guo, "Data Hiding in Halftone Images with Noise-Balanced Error Diffusion, " IEEE Signal Processing Letters, vol. 10, no. 12, Dec. 2003, pp. 345-351. [25] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding – a survey," Proceedings of the IEEE, vol. 87, no. 7, July 1999, pp. 1062-1078. [26] D. H. Pritchard, "U. S. color television fundamentals – a review," IEEE Transactions on Consumer Electronics, vol. CE-23, no. 4, 1977, pp. 467-478. [27] J. Spaulding, H. Noda , M. Shirazi and E. Kawaguchi, " BPCS Steganography Using EZW Lossy Compressed Images," Pattern Recognition Letters, vol. 23, no.13, Nov. 2002, pp. 1579-1587. [28] C. C. Thien and J. C. Lin, "A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function," Pattern Recognition, vol. 36, no. 12, Dec. 2003, pp. 2875-2881. [29] G.. Voyatzis, and I. Pitas, "Protecting Digital-Image Copyrights: A Framework, " IEEE Computer Graphics and Applications, vol. 1, 1999, pp.18-24. [30] M. Y. Wu, Y. K. Ho and J. H. Lee, "An Iterative Method of Palette-based Image Steganography, " Pattern Recognition Letters, vol. 25, no.3, Feb. 2004, pp. 301-309. [31] R. Z. Wang, C. F. Lin and J. C. Lin "Hiding by Optimal LSB Substitution and Genetic Algorithm, " Pattern Recognition, vol. 34, no.3, March 2001, pp. 671-683. [32] R. B. Wolfgang, and E. J. Delp, "A Watermark for Digital Image, " Proceedings of the 1996 International Conference on Image Processing, Lausanne, Switzerland, vol. 3, 1996, pp. 219-222. [33] D. C. Wu and W. H. Tsai, "Spatial-domain image hiding using image differencing," IEE Proceedings on Vision, Image and Signal Processing, vol. 147, no. 1, Feb. 2000, pp. 29-37.
|