|
Bibliography [1] G. R. Blakley, “Safeguarding cryptographic keys,” in Proceedings AFIPS 1979 National Computer Conference, vol. 48, pp. 313-317, June 1979. [2] N. Bourbakis and C. Alexopoulos, “Picture data encryption using scan patterns,”Pattern Recognition, vol. 25, no. 6, pp. 567-581, 1992. [3] N. Bourbakis and A. Dollas,“SCAN-based compression-encryption-hiding for video on demand,” IEEE MultiMedia, vol. 10, pp. 79-87, September 2003. [4] C. K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,”Pattern Recognition, vol. 37, no. 3, pp. 469-474, 2004. [5] C. C. Chang, T. S. Chen, and L. Z. Chung, “A steganographic method based upon JPEG and quantization table modification,” Information Sciences, vol. 141, no. 1-2, pp. 123-138, March 2002. [6] C. C. Chang, M. S. Hwang, and C. S. Chen, “A new encryption algorithm for image cryptosystems,” Journal of Systems and Software, vol. 58, no. 2, pp. 83-91, 2001. [7] C. C. Chang, T. K. Shih, and I. C. Lin, “Guessing by neighbors: An efficient reconstruction method for transmitting image progressively,” Visual Computer, vol. 19, no. 5, pp. 342-353, August 2003. [8] S. K. Chen and J. C. Lin, “Fault-tolerant and progressive transmission of images,”Pattern Recognition, vol. 38, no. 12, pp. 2466-2471, December 2005. [9] T. S. Chen, C. C. Chang, and M. S. Hwang, “A virtual image cryptosystem based on vector quantization,” IEEE Transactions on Image Processing, vol. 7, no. 10, pp. 1485-1488, 1997. [10] H. Cheng and Xiaobo Li, “Partial encryption of compressed images and videos,”IEEE Transactions on Signal Processing, vol. 48, no. 8, pp. 2439-2451, 2000. [11] Y. H. Chu and S. Chang, “Dynamical cryptography based on synchronised chaotic systems,” IEE Electronics Letters, vol. 35, no. 12, pp. 974-975, 1999. [12] K. L. Chung and S. Y. Tseng, “New progressive image transmission based on quadtree and shading approach with resolution control,” Pattern Recognition Letters, vol. 22, no. 14, pp. 1545-1555, December 2001. [13] K. Fan and W. Kou, “Steganography scheme for m-commerce,” Electronics Letters, vol. 41, no. 3, pp. 117-119, 2005. [14] J. B. Feng, H. C. Wu, C. S. Tsai, and Y. P. Chu, “A new multi-secret images sharing scheme using Largrange''s interpolation,” Journal of Systems and Software, vol. 76, no. 3, pp. 327-339, June 2005. [15] M. S. Fu and O. C. Au, “Data hiding watermarking for halftone images,” IEEE Transactions on Image Processing, vol. 11, no. 4, pp. 477-484, April 2002. [16] F. Hartung and F. Ramme, “Digital rights management and watermarking of multimedia content for m-commerce applications,” IEEE Communications Magazine, vol. 38, no. 11, pp. 78-84, 2000. [17] H. J. Highland, “Data encryption: a non-mathematical approach,” Computers and Security, vol. 16, no. 5, pp. 369-386, 1997. [18] M. T. Hogan, F. Balado, G. C. M. Silvestre, and N. J. Hurley, “Secure and robust steganography using side information at the encoder,” IEE Proceedings on Informa- tion Security, vol. 153, no. 3, pp. 87-95, September 2006. [19] C. T. Hsu and J. L. Wu, “Hidden digital watermarks in images,” IEEE Transactions on Image Processing, vol. 8, no. 1, pp. 58-68, June 1999. [20] K. L. Huang, C. C. Chang, and I. C. Lin, “A lossless compression-based progressive image transmission scheme,” Imaging Science Journal, vol. 52, no. 4, pp. 212-224, 2004. [21] K. L. Hung and C. C. Chang, “A novel progressive image transmission technique for chinese calligraphy,” International Journal of Computer Processing of Oriental Languages, vol. 14, no. 4, pp. 293-307, 2001. [22] H. Inoue, A. Miyazaki, and T. Katsura, “Wavelet-based watermarking for tamper proofing of still images,” in IEEE International Conference on Image Processing, vol. 2, pp. 88-91, September 2000. [23] S. Katzenbeisser and F. A. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Hardcover edition, February 2000. [24] H. Y. Kim and A. Afif, “A secure authentication watermarking for halftone and binary images,” International Journal of Imaging Systems and Technology, vol. 14, no. 4, pp. 147-152, December 2004. [25] C. J. Kuo, “Novel image encryption technique and its application in progressive transmission,” Journal of Electronic Imaging, vol. 2, no. 4, pp. 345-351, 1993. [26] C. C. Lin and W. H. Tsai, “Secret image sharing with capability of share data reduction,” Optical Engineering, vol. 42, no. 8, pp. 2340-2345, August 2003. [27] C. C. Lin and W. H. Tsai, “Secret image sharing with steganography and authentication,” Journal of Systems and Software, vol. 73, no. 3, pp. 405-414, November 2004. [28] P. L. Lin, C. K. Hsieh, and P. W. Huang, “A hierarchical digital watermarking method for image tamper detection and recovery,” Pattern Recognition, vol. 38, no. 11, pp. 2519-2529, December 2005. [29] D. C. Lou and C. H. Sung, “A steganography scheme for secure communication based on the Chaos and Euler theorem,” IEEE Transactions on Multimedia, vol. 6, no. 3, pp. 501-509, 2004. [30] C. S. Lu and H. Y. Liao, “Multipurpose watermarking for image authentication and protection,” IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1579-1592, October 2001. [31] Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362, March 2006. [32] S. C. Pei and J. M. Guo, “High-capacity data hiding in halftone images using minimal-error bit searching and least-mean square filter,” IEEE Transactions on Image Processing, vol. 15, no. 6, pp. 1665-1679, June 2006. [33] S. C. Pei, J. M. Guo, and H. Lee, “Novel robust watermarking technique in dithering halfton images,” IEEE Signal Processing Letters, vol. 12, no. 4, pp. 333-336, April 2005. [34] J. A. Senn, “The emergence of m-commerce,” Computer, vol. 33, no. 12, pp. 148-150, 2000. [35] A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612-613, November 1979. [36] G. J. Simmons, “The prisoners'' problem and the subliminal channel,” in CRYPTO''83, pp. 51-67, 1983. [37] C. C. Thien and J. C. Lin, “Secret image sharing,” Computers and Graphics, vol. 26, no. 1, pp. 765-770, October 2002. [38] C. C. Thien and J. C. Lin, “An image-sharing method with user-friendly shadow images,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 3, no. 12, pp. 1161-1169, December 2003. [39] C. C. Thien and J. C. Lin, “A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function,” Pattern Recognition, vol. 36, no. 12, pp. 2875-2881, December 2003. [40] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890-896, August 2003. [41] C. L. Tsai, H. F. Chiang, K. C. Fan, and C. D. Chung, “Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mecha- nism,” Pattern Recognition, vol. 38, no. 11, pp. 1993-2006, 2005. [42] C. S. Tsai, C. C. Chang, and T. S. Chen, “Sharing multiple secrets in digital images,”Journal of Systems and Software, vol. 64, no. 2, pp. 163-170, November 2002. [43] Y. Y. Tsai and C. M. Wang, “A novel data hiding scheme for color images using a bsp tree,” Journal of Systems and Software, vol. 80, no. 3, pp. 429-437, March 2007. [44] Y. C. Tseng, Y. Y. Chen, and H. K. Pan, “A secure data hiding scheme for binary images,” IEEE Transactions on Communications, vol. 50, no. 8, pp. 1227-1231, August 2002. [45] S. Walton, “Image authentication for slippery new age,” Dr. Dobbs Journal, vol. 20, no. 4, pp. 18-26, 1995. [46] C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, “A high quality steganographic method with pixel-value differencing and modulus function,” Journal of Systems and Software, In Press, Corrected Proof, 2007. [47] R. Z. Wang and Y. S. Chen, “High-payload image steganography using two-way block matching,” IEEE Signal Processing Letters, vol. 13, no. 3, pp. 161-164, March 2006. [48] R. Z. Wang, C. F. Lin, and J. C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, vol. 34, no. 3, pp. 671-683, 2001. [49] R. Z. Wang, C. P. Lin, and J. C. Lin, “Hiding data in images by optimal moderately-significant-bit replacement,” IEE Electronics Letters, vol. 36, no. 25, pp. 2069-2070, 2000. [50] R. Z. Wang and C. H. Su, “Secret image sharing with smaller shadow images,” Pattern Recognition Letters, vol. 27, no. 6, pp. 551-555, April 2006. [51] R. Z. Wang and Y. D. Tsai, “An image-hiding method with high hiding capacity based on best-block matching and k-means clustering,” Pattern Recognition, vol. 40, no. 2, pp. 398-409, February 2007. [52] S. J. Wang, “Steganography of capacity required using modulo operator for embedding secret image,” Applied Mathematics and Computation, vol. 164, no. 1, pp. 99-116, May 2005. [53] D. C. Wu and W. H. Tsai, “Spatial-domain image hiding using image differencing,”IEE Proceedings on Vision, Image and Signal Processing, vol. 147, no. 1, pp. 29-37, 2000. [54] H. C. Wu, N. I. Wu, C. S. Tsai, and M. S Hwang, “Image steganographic scheme based on pixel-value differencing and lsb replacement methods,” IEE Proceedings on Vision, Image and Signal Processing, vol. 152, no. 5, pp. 611-615, October 2005. [55] Y. S. Wu, C. C. Thien, and J. C. Lin, “Sharing and hiding secret images with size constraint,” Pattern Recognition, vol. 37, no. 7, pp. 1377-1385, July 2004. [56] C. N. Yang, T. S. Chen, K. H. Yu, and C. C. Wang, “Improvements of image sharing with steganography and authentication,” Journal of Systems and Software, vol. 80, no. 7, pp. 1070-1076, July 2007. [57] L. Yu, X. Niu, and S. Sun, “Print-and-scan model and the watermarking countermeasure,” Image and Vision Computing, vol. 23, no. 9, pp. 807-814, 2005. [58] X. Zhang and S. Wang, “Steganography using multiple-base notational system and human vision sensitivity,” IEEE Signal Processing Letters, vol. 12, no. 1, pp. 67-70, 2005.
|