|
[1] N. F. Johnson and S. Jajodia, “Exploring stegnography:seeing the unseen,” IEEE Computer, vol. 31, no. 2, pp. 26–34, 1998. [2] J. Fridrich, Steganography in Digital Media:Priciples, Algorithms, and Applications. Cambridge, U.K. :Cambridge Univ. Press, 2009. [3] N. Provos and P. Honeyman, “Hide and seek:An introduction to steganography,” IEEE Security Privacy, vol. 3, no. 3, pp. 3244, 2003. [4] A. Cheddad, J. Condell, K. Curran and P. McKevitt, “Digital image steganography:Survey and analysis of current methods,” Signal Processing, vol. 90, pp. 727752, 2010. [5] W. Bender, D. Gruhl, N. Morimoto and A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol. 35, no. 3&4, pp. 313336, 1996. [6] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding – a survey.” Proceedings of the IEEE, vol. 87, no. 7, pp. 1062–1078, 1999. [7] S. Katzenbeisser and F. A. P. Petitcolas, “Information hiding techniques for steganography and digital watermarking,” Artech House Book Company. [8] G. L. Simmons, “The prisoners’ problem and subliminal channels,” Proceedings of Crypto 83, pp. 51–67, 1984. [9] C.C. Thien and J.C. Lin “A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function,” Pattern Recognition, vol. 36, no. 12, pp. 28752881, 2003. [10] C.K. Chan and L.M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition, vol. 37, no. 3, pp. 469474, 2004. [11] R. Z. Wang, C. G. Lin and J. C. Lin, “Hiding data in images by optimal moderately significant-bit replacement,” Electronics Letters, vol. 36, no 25, pp. 2069–2070, 2000. [12] R. Z. Wang, C. F. Lin and J. C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, vol. 34, no. 3, pp. 671–683, 2001. [13] C. K. Chan and L. M. Cheng, ”Hiding data in images by simple LSB substitution,” Pattern Recognition, Vol. 37, No. 3, pp. 469–474, 2004. [14] J. Mielikainen, “LSB Matching revisited,” IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285–287, 2006. [15] X. Zhang and S. Wang, “Efficient steganographic embedding by exploiting modification direction,” IEEE Communication Letters, vol. 10, no. 11, pp.782–783, 2006. [16] W. Hong, T. S. Chen and C. W. Shiu, “A minimal Euclidean distance searching technique for Sudoku steganography,” Information Science and Engineering, vol. 1, pp. 515518, 2008. [17] R.M. Chao, H.C. Wu, C.C. Lee and Y.P. Chu, “A novel image data hiding scheme with diamond encoding,” EURASIP Journal on Information Security, Article ID 658047, pp. 1 9, 2009. [18] W. Hong and T.S. Chen, “A novel data embedding method using adaptive pixel pair matching,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 1, pp. 176184, 2012.
|