|
[1] 呂慈純、陸哲明、張真誠,多媒體安全技術: 全華圖書股份有限公司,2007。 [2]C. C. Chang and H. W. Tseng (2004), "A steganographic method for digital images using side match," Pattern Recognition Letters, vol. 25, pp. 1431-1437. [3]C. C. Chang, C. Y. Lin, and Y. Z. Wang (2006), "New image steganographic methods using Run-Length approach," Information Sciences, vol. 176, pp. 3393-3408. [4]C. C. Lin, W. L. Tai, and C.C. Chang (2008), "Multilevel reversible data hiding based on histogram modification of difference images," Pattern Recognition, vol. 41, pp. 3582-3591. [5]C. K. Chan and L. M. Cheng (2004), "Hiding data in images by simple LSB substitution," Pattern Recognition, vol. 37, pp. 469-474. [6]C. N. Lin, D. J. Buehrer, C. C. Chang, and T. C. Lu (2010), "Using quad smoothness to efficiently control capacity-distortion of reversible data hiding," Journal of Systems and Software, vol. 83, pp. 1805-1812. [7]D. C. Lou, M. C. Hu, and J. L. Liu (2009), "Multiple layer data hiding scheme for medical images," Computer Standards & Interfaces, vol. 31, pp. 329-335. [8]D. M. Thodi and J. J. Rodriguez (2007), "Expansion embedding techniques for reversible watermarking," IEEE Transactions on Image Processing, vol. 16, pp. 721-730. [9]H. W. Tseng and C. P. Hsieh (2009), "Prediction-based reversible data hiding," Information Sciences, vol. 179, pp. 2460-246. [10]J. Tian (2003), "Reversible data embedding using a difference expansion," IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, pp. 890-896. [11]K. S. Kim, M. J. Lee, H. Y. Lee, and H. K. Lee (2009), "Reversible data hiding exploiting spatial correlation between sub-sampled images," Pattern Recognition, vol. 42, pp. 3083-3096. [12]M. Fallahpour and M.H. Sedaaghi (2007), "High capacity lossless data hiding based on histogram modification," IEICE Electronics Express, vol. 4, pp. 205-210. [13]O. M. A. Qershi and B. E. Khoo (2010), "High capacity data hiding schemes for medical images based on difference expansion," Journal of Systems and Software, vol. 84, pp. 105-112. [14]P. Tsai, Y.C. Hu, and H. L. Yeh (2009), "Reversible image hiding scheme using predictive coding and histogram shifting," Signal Processing, vol. 89, pp. 1129-1143. [15]R. L. Rivest and R. D. Silverman (1999), "Are ''strong'' primes needed for RSA," The 1997 RSA Laboratories Seminar Series. [16]R. Z. Wang, C. F. Lin, and J. C. Lin (2001), "Image hiding by optimal LSB substitution and genetic algorithm," Pattern Recognition, vol. 34, pp. 671-683. [17]T. Kim (1992), "Side match and overlap match vector quantizers for images," IEEE Transactions on Image Processing, vol. 1, pp. 170-185. [18]W. Hong, T. S. Chen, and C. W. Shiu (2009), "Reversible data hiding for high quality images using modification of prediction errors," Journal of Systems and Software, vol. 82, pp. 1833-1842. [19]W. Bender, D. Gruhl, N. Morioto, and A. Lu (1996), "Techniques for data hiding," International Business Machines Corporation System Journal, vol. 35, pp. 313-336. [20]W. Chou (2002), "Inside SSL: the secure sockets layer protocol," IT Professinoal, vol. 4, pp. 47-52. [21]W. Diffie and M.E. Hellman (1977), "Special feature exhaustive cryptanalysis of the NBS data encryption standard," IEEE Computer Society, vol. 10, pp. 74-84. [22]W. Hong and T. S. Chen (2010), "A local variance-controlled reversible data hiding method using prediction and histogram-shifting," Journal of Systems and Software, vol. 83, pp. 2653-2663. [23]W. Hong, T. S. Chen, Y. P. Chang, and C. W. Shiu (2010), "A high capacity reversible data hiding scheme using orthogonal projection and prediction error modification," Signal Processing, vol. 90, pp. 2911-2922. [24]W. L. Tai, C. M. Yeh, and C. C. Cheng (2009), "Reversible data hiding based on histogram modification of pixel differences," IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, pp. 906-910. [25]W. N. Lie and L. C. Chang (1999), "Data hiding in images with adaptive numbers of least significant bits based on the human visual system," International Conference on Image Processing, vol.1, pp. 286-290. [26]X. P. Zhang and S. Z. Wang (2006), "Efficient steganographic embedding by exploiting modification direction," IEEE Communications Letters, vol. 10, pp. 781-783. [27]Z. Ni, Y. Q. Shi, A. Nirwan, and W. Su (2006), "Reversible data hiding," IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, pp. 354-362.
|