|
[1]T. S. Chen, C. C. Chang, and M. S. Hwang, “A virtual image cryptosystem based upon vector quantization,” IEEE Transactions on Image Processing, 1998, Vol. 7, No. 10, pp. 1485-1488.
[2]R. Z. Wang, C. F. Lin, and J. C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, 2001, Vol. 34, No. 3, pp. 671-683.
[3]R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communication of the ACM, 1978, Vol. 21, No. 2, pp. 120-126.
[4]W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, 1996, Vol. 35, No. 3 and 4, pp. 313-336.
[5]A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding – A survey,” Proceeding of IEEE, 1999, Vol. 87, No. 7, pp. 1062-1078.
[6]R. G. Schyndel, A. Z. Tirkel, and C. F. Osborne, “A digital watermark,” IEEE International Conference on Image Processing, 1994, Vol. 2, pp. 86-90.
[7]C. C. Chang, J. C. Yeh, and J. Y. Hsiao, “A novel scheme for securing image steganography,” IEEE Pacific Rim Conference on Multimedia, 2001, pp. 804-811.
[8]P. C. Su, C. J. Kuo, “Steganography in JPEG2000 compressed images,” IEEE Transactions on Consumer Electronics, 2003, Vol. 49, No. 4, pp. 824-832.
[9]D. C. Lou, J. L. Liu, “Steganography method for secure communications,” Elsevier Science on Computers & Security, 2002, Vol. 21, No. 5, pp. 449-460.
[10]張真誠、陳同孝、黃國峰,電子影像技術,松崗電腦圖書資料股份有限公司,2000。
[11]陳同孝、張真誠、黃國峰,數位影像處理技術,旗標出版股份有限公司,2002。 [12]Y. C. Tseng, Y. Y. Chen, and H. K. Pan, “A secure data hiding scheme for binary images,” IEEE Transactions on Communications, 2002, Vol. 50, pp. 1227-1231.
[13]Y. K. Lee, L. H. Chen, “High capacity steganographic model,” IEE Proceedings Vision, Image and Signal processing, 2000, Vol. 147, No. 3, pp. 288-294.
[14]C. K. Chan, L. M. Cheng, “Hiding data in image by simple LSB substitution,” Pattern Recognition, 2003, Vol. 37, pp. 469-474.
[15]C. C. Chang, H. W. Tseng, “A steganographic method for digital images using side match,” Pattern Recognition Letters, 2004, Vol. 25, pp. 1431-1437.
[16]Y. H. Yu, C. C. Chang, and Y. C. Hu, “Hiding secret data in images via predictive coding,” International Journal on Pattern Recognition, 2005, Vol. 38, pp. 691-705.
[17]C. C. Chang, T. S. Chen, and L. Z. Chung, “A steganographic method based upon JPEG and quantization table modification,” Information Sciences, 2002, Vol. 141, pp123-138.
[18]S. Torres, M. Nakano, and H. Perez, “An image steganography systems based on BPCS and IWT,” 16th International Conference on Electronics, Communications and Computers, 2006, pp. 51-56.
[19]Po-Yueh Chen, Hung-Ju Lin, “A steganography method on DWT features,” 2005 Symposium on Digital Life and Internet Technologies, National Cheng Kung University, Tainan, Taiwan, R.O.C. , 2005.
[20]Po-Yueh Chen, En-Chi Liao, “A new algorithm for Haar Wavelet transform,” IEEE International Symposium on Intelligent Signal Processing and Communication System, National Sun Yat-Sen University, Kaohsiung, Taiwan, R.O.C. , 2002, No. 21-24, pp. 453-457.
|