|
[1]CCITT Recommendation T.81, “Digital Compression and Coding of Continuous-tone Still Images”, 1992
[2]C.C. Chang, C.L. Chiang and J.Y. Hsiao, “A DCT-domain System for Hiding Fractal Compressed Images.”, Proceedings of the 19th International Conference on Advanced Information Networking and Applications, Vol. 2 Pages 83-86, 2005
[3]C.C. Chang, Y.C. Chou and J.J. Shen, “Improving Image Quality for JPEG Compression” Ninth International Conference on Knowledge-Based Intelligent Information & Engineering Systems, LNAI 3683, Pages 442-448, 2005
[4]C.K Chan, L.M. Cheng, K.C. Leung and S.L. Li, “Image Hiding Based on Block Difference”, 8th International Conference on Control , Automation, Robotics and Vision, Vol. 2, Pages 968-972, 2004
[5]D.C. Wu and W.H. Tsai, “Spatial-domain Image Hiding Using Image Differencing”, IEE Proc.-Vis. Image Signal Processing., Vol. 147, No.1, 2000
[6]G.C. Langelaar , R.L. Lagendijk and J. Biemond, “Watermarking by DCT Coefficient Removal: A Statistical Approach to Optimal Parameter Settings”, Proc. SPIE Vol. 3657 Security and Watermarking of Multimedia Contents, Pages 2-13, 1999
[7]G.K. Wallace, “The JPEG Still Image Compression Standard”, Consumer Electronics, IEEE Transactions, Vol. 38, Issue 1, Pages xviii-xxxiv, 1992
[8]http://www.ijg.org/
[9]H.W. Tseng and C.C. Chang, “Steganography Using JPEG-Compressed Images”, Proceedings of the Fourth International Conference on Computer and Information Technology, Pages 12-17, 2004
[10]H.W. Wong, C. Au and W.C. Wong, “A Data Hiding Technique in JPEG Compressed Domain”, Proc. SPIE Vol. 4314 Security and Watermarking of Multimedia Contents III, Pages 309-320, 2001
[11]H.W. Wong, C. Au and W.C. Wong, “Data Hiding and Watermarking in JPEG Compressed Domain by DC Coefficient Modification”, Proc. SPIE Vol. 3971 Security and Watermarking of Multimedia Contents II, Pages 237-244, 2000
[12]J. Fridrich, M. Goljan and R. Du, “Invertible Authentication Watermark for JPEG Images” IEEE International Conference on Information Technology: Coding and Computing, 2001. Proceedings, Pages 223-227, 2001
[13]M. Iwata, K. Miyake and A. Shiozaki, “Digital Steganography Utilizing Features of JPEG Images” IEICE Trans. Fundamentals, Vol. E87-A, No. 4, 2004
[14]R.M. Gary, “Vector Quantization”, IEEE ASSP Magazine, Apr. 1984, Vol.1, Issue 2, Pages 4-29, 1984
[15]S.F. Lin, S.C Shie and C.C. Chou, “A suitable Image Hiding Scheme for JPEG Images”, 2004 International Conference on Image Processing, Vol. 3, Pages 1565-1568, 2004
[16]T.S. Chen, C.C. Chang and M.S. Hwang, “A Virtual Image Cryptosystem Based upon Vector Quantization”, IEEE Transaction on Image Processing, Vol.7 No. 10 Page 1485-1488, 1998
[17]Y.C. Hu, “Grey-level Image Hiding Scheme based on Vector Quantization”, Electronics Letters, Vol. 39, No. 2, Pages 202-203, 2003
[18]Y. Linde, A. Buzo and R. Gray “An Algorithm for Vector Quantizer Design”, IEEE Transactions on Communications , Vol. COM-28, No. 1, Pages 84-95,1980
[19]Y. Noguchi, H. Kobayashi and H. Kiya, “A Method of Extracting Embedded Binary Data from JPEG Bitstreams using Standard JPEG Decoder”, IEEE International Conference on Image Processing, 2000 Proceedings, Vol. 1, Pages 577-580,2000
[20]陳同孝,張真誠,黃國峰, ”數位影像處理技術”, 旗標出版社, 92年出版
|