|
[Alat2004] A. M. Alattar, “Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform,” IEEE Transactions on Image Processing, Vol. 13, No. 8, pp. 1147–1156, August 2004. [Ande1998] R. J. Andersen and F. A. P. Petitcolas, “On the Limits of Steganography,” IEEE Journal of Selected Areas in Communications, Special Issue on Copyright and Privacy Protection, Vol. 16, No. 4, pp. 474-481, May 1998. [Besd2005] E. Besdok, “Hiding Information in Multispectral Spatial Images,” Journal of Electronics and Communications, Vol. 59, pp. 15-24, 2005. [Cald2006] R. Caldelli, F. Filippini and M. Barni, “Joint Near-Lossless Compression and Watermarking of Still Images for Authentication and Tamper Localization,” Signal Processing: Image Communication, Vol. 21, pp. 890-903, November 2006. [Celi2005] M.U.Celik,G.S.,A.M. Tekalp, and E. Saber, “Lossless Generalized-LSB Data Embedding,” IEEE Transactions on ImageProcessing, Vol. 14, pp. 253-266, February 2005. [ Chan2003] C. C. Chang, J. Y. Hsiao, and C. S. Chan, “Finding Optimal Least-Significant-Bit Substitution in Image Hiding by Dynamic Programming Strategy,” Pattern Recognition, Vol. 36, pp. 1583-1595, July 2003. [ Chan2004a] C. K. Chan and L. M. Cheng, “Hiding Data in Images by Simple LSBSubstitution,” Pattern Recognition, Vol. 37, pp. 469-474, March 2004. [Chan2004b] C. C. Chang and H. W. Tseng, “A Steganographic Method for Digital Images Using Side Match,” Pattern Recognition Letters, No. 25, pp. 1431–1437, June 2004. [Chen2001] B. Chen and G. W. Wornell, “Quantization Index Modulation Methods: A Class of Provably Good Methods for Digital Watermarking and Information Embedding,” IEEE Transactions on Information Theory, Vol. 47, No. 4, pp. 1423-1443, May 2001. [ Cox1996] I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “A Secure, Robust Watermark for Multimedia,” Lecture Notes In Computer Science(Proceedings of the First International Workshop on Information Hiding), Vol. 1174, pp. 185-206, 1996. [ Cox2001] I. J. Cox and M. L. Miller, “Electronic Watermarking: the First 50 Years,” 2001 IEEE Fourth Workshop on Multimedia Signal Processing, pp. 225-230, October 2001. [Fu2002] M. S. Fu and O. C. Au, “Data Hiding Watermarking for Halftone Images,” IEEE Transactions on Image Processing, Vol. 11, No. 4, pp. 477-484, 2002. [John1998] N. F. Johnson and S. Jajodia, “Steganography: Seeing the Unseen,” IEEE Transactions on Computers, Vol. 31, pp. 26-34, February 1998. [Kams2005] L. Kamstra and H. J. A. M. Heijmans, “Reversible Data Embedding into Images Using Wavelet Techniques and Sorting,” IEEE Transactions on Image Processing, Vol. 14, No. 12, pp. 2082–2090, December 2005. [Lyu2005] S. Lyu and H. Farid, “How Realistic is Photorealistic?,” IEEE Transactions on Signal Processing Supplement on Secure Media, Vol. 53, No. 2, pp. 845-850, February 2005. [Miel2006] J. Mielikainen, “LSB Matching Revisited,” IEEE Signal Processing Letters, Vol. 13, No. 5, pp. 285-287, May 2006. [ Peti1999] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information Hiding--A Survey,” Proceedings of the IEEE: Special Issue on Identification and Protection of Multimedia Content, Vol. 87, pp. 1062-1078, July 1999. [Stei2001] Y. Steinberg and N. Merhav, “Identification in The Presence of Side Information With Application to Watermarking,” IEEE Transactions on Information Theory, Vol. 47, No. 4, pp. 1410-1422, May, 2001. [Simm1983] G. J. Simmons, “The Prisoners'' Problem and the Subliminal Channel,” Proceedings of CRYPTO''83, pp. 51-67, 1983. [Tana1990] K. Tanaka, Y. Nakamura, and K. Matsui, “Embedding Secret Information Into A Dithered Multi-Level Image,” In: Proceedings of IEEE International Conference on Image Processing, pp. 216-220, 1990. [Thie2003] C. C. Thien and J. C. Lin, “A Simple and High-hiding Capacity Method for Hiding Digit-By-Digit Data in Images Based on Modulus Function,” Pattern Recognition, Vol. 36, pp. 2875-2881, December 2003. [Tsen2002a] Y. C. Tseng, Y. Y. Chen, and H. K. Pan, “A Secure Data Hiding Scheme for Binary Images,” IEEE Transactions on Communications, Vol. 50, pp. 1227-1231, August 2002. [Tsen2002b] Y. C. Tseng and H. K. Pan, “Data Hiding in 2-Color Images,” IEEE Transactions on Computers, Vol. 51, No. 7, pp.873-878, July 2002. [ Tzen2004a] C. H. Tzeng, Z. F. Yang, and W. H. Tsai, “Adaptive Data Hiding in Palette Images by Color Ordering and Mapping With Security Protection,” IEEE Transactions on Communications, Vol. 52, pp. 791-800, May 2004. [Tzen2004b] C. H. Tzeng and W.-H. Tsai, “A New Approach to Authentication of Binary Image for Multimedia Communication With Distortion Reduction and Security Enhancement,” IEEE Communications Letters, Vol. 7, September 2004. [Wang2001] R. Z. Wang, C. F. Lin, and J. C. Lin, “Image Hiding by Optimal LSB Substitution and Genetic Algorithm,” Pattern Recognition, Vol. 34, pp. 671-683, March 2001. [Wang2005] S. J. Wang, “Steganography of Capacity Required Using Modulo Operator for Embedding Secret Image,” Applied Mathematics and Computation, pp. 99-116, January 2005. [Wang2006] C. M. Wang and P. C. Wang, “Steganography on Point-Sampled Geometry,” Computers & Graphics, Vol. 30, pp. 244-254, April 2006. [Wang2008] C. M. Wang, N. I. Wu, C. S. Tsai and M. S. Hwang, “A High Quality Steganographic Method With Pixel-Value Differencing and Modulus Operation,” The Journal of Systems and Software, Vol. 81, pp. 150-158, January 2008. [Wu2003] D. C. Wu and W. H. Tsai, “A Steganographic Method for Images by Pixel-Value Differencing,” Pattern Recognition Letters, Vol. 24, No. 9-10, pp. 1613-1626, June 2003. [Wu2004] M. Wu and B. Liu, “Data Hiding in Binary Image for Authentication and Annotation,” IEEE Transactions on Multimedia, Vol. 6, pp. 528-538, August 2004. [Wu2005] H. C. Wu, N. I. Wu, C. S. Tsai and M. S. Hwang, “Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods,” IEE Proceedings on Vision, Image, and Signal Processing, Vol. 152, No. 5, pp. 611-615, October 2005. [Wu2007] N. I. Wu and M. S. Hwang, “Data hiding: Current Status and Key Issues,” International Journal of Network Security, Vol. 4, pp.1-9, January 2007. [Yang2007] H. Yang and A. C. Kot, “Pattern-Based Data Hiding for Binary Image Authentication By Connectivity-Preserving,” IEEE Transactions on Multimedia, Vol. 9, pp. 475–486, April 2007. [Yang2008] C. H. Yang, “Inverted Pattern Approach to Improve Image Quality of Information Hiding by LSB Substitution,” Pattern Recognition, in press, accepted manuscript, available online, February 2008. [Zhan2005] X. Zhang and S. Wang, “Steganography Using Multiple-Base Notational System and Human Vision Sensitivity,” IEEE Signal Processing Letters, Vol. 12, pp. 67-70, January 2005.
|