|
[1] B. Pfitzmann,“Information Hiding Terminology,"Proceeding of the first workshop on Information Hiding, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Cambridge, UK, pp. 347-350 [2] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn,“Information Hiding : A-Survery,"Proceedings of IEEE, Vol. 87, No. 7, Jul. 1999, pp. 1062-1078. [3] G. L. Simmons,“The prisoners and subliminal channels,"Proc. Annu. Int. Cryptology Conf, SantaBarbara, CA, 1984, pp. 51-67 [4] Jeanne Chen, Tung-Shou Chen, and Meng-Wen Cheng,“A New Data Hiding Method in Binary Image,"Proceedings of the IEEE Fifth International Symposium on Multimedia Software Engineering (ISMSE 03) [5] Ming Sun Fu, and Oscar C. Au,“Data Hiding Watermarking for Halftone Images,"IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 11, NO. 4, APRIL 2002, pp.477-484 [6] Ming Sun Fu, Oscar C. Au,“Data Hiding in Halftone Images by Conjugate Error Diffusion,"IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 3, May 2001, pp. 1965-1968 [7] Hae Yong Kim, Amir Afif,“Secure Authentication Watermarking for Binary Images,"Proceedings of the XVI Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI 03) [8] Haiping Lu, Alex C. Kot, and Rahardja Susanro,“BINARY IMAGE WATERMARKING THROUGH BIASED BINARIZATION,"IEEE International Conference on Multimedia & Expo (ICME) 2003, pp.III.101 - III.104 [9] Haiping Lu, Xuxia Shi, Yun Q. Shi, Alex C. Kot and Lihui Chen,“Watermark Embedding in DC Components of DCT for Binary Images,"Multimedia Signal Processing, IEEE Workshop on Volume, 2002, pp.300-303 [10] Shao-Hui Liu ,Tian-Hang Chen, Hong-Xun Yao, and Wen Gao,“A VARIABLE DEPTH LSB DATA HIDING TECHNIQUE IN IMAGES,"Proceedings of the Third International Conference on Machine Learning and Cybernetics, Shanghai, 26-29 August 2004 [11] F. Y. Shih and C.-H. T. Yang,“On solving exact Euclidean distance transformation with invariance to object size,"Proc. IEEE Conf. Computer Vision and Pattern Recognition, New York City, NY, June 1993, pp. 607-608. [12] Phil Sherry and Andreas Savakis,“IMPROVED TECHNIQUES FOR WATERMARKING HALFTONE IMAGES,"ICASSP 2004,pp.V1005-V1008 [13] Chih-Hsuan Tzeng and Wen-Hsiang Tsai,“A New Approach to Authentication of Binary Images for Multimedia Communication With Distortion Reduction and Security Enhancement,"IEEE COMMUNICATIONS LETTERS, VOL. 7, NO. 9, SEPTEMBER 2003, pp. 443-445 [14] Yu-Chee Tseng and Hsiang-Kuang Pan,“Secure and Invisible Data Hiding in 2-Color Images,"IEEE INFOCOM, 2001, pp. 887-896 [15] Chun-Chieh Wang and Long-Wen Chang,“High Capacity Binary Image Steganography,"18th Conference on Computer Vision, Graphics and Image Processing (CVGIP 2005), Taipei, ROC, August, 2005, pp. 1309-1316 [16] Hsi-Chun Alister Wang,“Data Hiding Techniques for Printed Binary Images,"International Conference on Information Technology: Coding and Computing (ITCC 01) 2001, pp. 055 [17] Min Wu, and Bede Liu,“Data hiding in binary image for authentication and annotation,"IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 6, NO. 4, AUGUST 2004, pp. 528-538 [18] Huijuan Yang and Alex C. Kot,“DATA HIDING FOR BI-LEVEL DOCUMENTS USING SMOOTHING TECHNIQUE,"IEEE International Symposium on Circuits and Systems (ISCAS) 2004, pp.V692-V695 [19] 王旭正、柯宏叡、ICCL-資訊密碼暨建構實驗室,「資訊與網路安全:秘密通訊與數位鑑識新技法」,博碩文化股份有限公司,2006
|