|
參考文獻 [1]C.C. Chang, J.Y. Hsiao, and C.S. Chan, “Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy,” Pattern Recognit., vol. 36, no. 7, pp. 1583–1595, 2003. [2]M. Khodaei and K. Faez, “New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing,” IET Image Process., vol. 6, no. September, pp. 677, 2012. [3]K.-H.Jung, “High-capacity steganographic method based on division arithmetic and LSB replacement,” Imaging Sci. J., vol. 180, no. August, pp. 213–221, 2012. [4]S.Y. Shen and L.H. Huang, “A data hiding scheme using pixel value differencing and improving exploiting modification directions,” Comput. Secur., vol. 48, pp. 131–141, 2015. [5]D.C. Wu and W.H. Tsai, “A steganographic method for images by pixel-value differencing,” Pattern Recognit. Lett., vol. 24, no. 9–10, pp. 1613–1626, 2003. [6]H.C. Wu, N.I. Wu, C.S. Tsai, and M.S. Hwang, “Image steganographic scheme based on pixel-value differencing and LSB replacement methods,” Chinese J. Electron., vol. 14, no. 1, pp. 115–118, 2005. [7]X. Zhang and S. Wang, “Efficient steganographic embedding by exploiting modification direction,” IEEE Commun. Lett., vol. 10, no. 11, pp. 781–783, 2006. [8]J. Chen, “A PVD-based data hiding method with histogram preserving using pixel pair matching,” Signal Process. Image Commun., vol. 29, no. 3, pp. 375–384, 2014. [9]C.K. Chan and L.M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognit., vol. 37, no. 3, pp. 469–474, 2004. [10]W. Hong and T.S. Chen, “A novel data embedding method using adaptive pixel pair matching,” IEEE Trans. Inf. Forensics Secur., vol. 7, no. 1, pp. 176–184, 2012. [11]T.D. Kieu and C.C. Chang, “A steganographic scheme by fully exploiting modification directions,” Expert Syst. Appl., vol. 38, no. 8, pp. 10648–10657, 2011. [12]C.H. Yang, C.Y. Weng, H.K. Tso, and S.J. Wang, “A data hiding scheme using the varieties of pixel-value differencing in multimedia images,” J. Syst. Softw., vol. 84, no. 4, pp. 669–678, 2011. [13]V. Sabeti, S. Samavi, M. Mahdavi, and S. Shirani, “Steganalysis of pixel-value differencing steganographic method,” IEEE Pacific RIM Conf. Commun. Comput. Signal Process. - Proc., no. September, pp. 292–295, 2007. [14]C.C. Chang and H. Tseng, “A steganographic method for digital images using side match,” Pattern Recognit. Lett., vol. 25, no. 12, pp. 1431–1437, 2004. [15]G. Swain, “Digital image steganography using nine-pixel differencing and modified LSB substitution,” Indian J. Sci. Technol., vol. 7, no. 9, pp. 1444–1450, 2014. [16]K.C. Chang, C.P. Chang, P.S. Huang, and T.M. Tua, “A novel Image Steganographic Method Using Tri-way Pixel-Value Differencing,” J. Multimed., vol. 3, no. 2, pp. 37–44, 2008. [17]X. Li, J. Li, B. Li, and B. Yang, “High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion,” Signal Processing, vol. 93, no. 1, pp. 198–205, 2013. [18]Y.Q. Shi, “Reversible data hiding,” vol. 16, no. 3, pp. 1–12, 2005. [19]J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, 2003. [20] C.H. Yang “Inverted pattern approach to improve image quality of information hiding by LSB substitution,” Pattern Recognit., vol. 41, no. 8, pp. 2674–2683, 2008. [21] SIPI Image Database, (http://sipi.usc.edu/database/database.php) [22] ImageProcessingPlace, (http://www.imageprocessingplace.com/)
|