|
[Borg2008]P. Borges, J. Mayer, and E. Izquierdo, “Robust and transparent color modulation for text data hiding,” IEEE Transactions on Multimedia, vol. 10, no. 8, pp. 1479-1489, 2008. [Chao2009]M. W. Chao, C. H. Lin, C. W. Yu, and T. Y. Lee, “A high capacity 3D steganography algorithm,” IEEE Transactions on Visualization and Computer Graphics, vol. 15, no. 2, pp. 274-284, 2009. [Chen2006]Y. M. Cheng and C. M. Wang, “A high-capacity steganographic approach for 3D polygonal meshes,” The Visual Computer, vol. 22, no. 9, pp. 845-855, 2006. [Cogr2015]R. Cogranne and J. Fridrich, “Modeling and extending the ensemble classifier for steganalysis of digital images using hypothesis testing theory,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 12, pp. 432-444, 2015. [Drag2014]I. C. Dragoi and D. Coltuc, “Local-prediction-based difference expansion reversible watermarking,” IEEE Transactions on Image Processing, vol. 23, no. 4, pp. 1779-1790, 2014. [Frid2001]J. Fridrich, M. Goljan, and R. Du, “Detecting LSB steganography in color, and gray-scale images,” IEEE Multimedia, vol. 8, no. 4, pp. 22-28, 2001. [John1998]N. F. Johnson and S. Jajodia, “Exploring steganography: seeing the unseen,” Computer, vol. 31, no. 2, pp. 26-34, 1998. [Kodo2012]J. Kodovsky, J. Fridrich, and V. Holub, “Ensemble classifiers for steganalysis of digital media,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 432-444, 2012. [Li2009]M. T. Li, N. C. Huang, K. C. Wu, C. K. Jan, and C. M. Wang, “An effective message embedding scheme for 3D models,” Fundamenta Informaticae, vol. 97, no. 1-2, pp. 93-109, 2009. [Liu2012]S. C. Liu and W. H. Tsai, “Line-based cubism-like image—A new type of art image and its application to lossless data hiding,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 5, pp. 1448-1458, 2012. [Mali2007]H. M. A. Malik, R. Ansari, and A. A. Khokhar, “Robust data hiding in audio using allpass filters,” IEEE Transactions on Audio, Speech, and Language Processing, vol. 15, no. 4, pp. 1296-1304, 2007. [Paru2009]J. K. Paruchuri, S. C. Cheung, and M. Hail, “Video data hiding for managing privacy information in surveillance systems,” EURASIP Journal on Information Security, Article ID 236139, vol. 2009. [Peti1999]F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding-a survey,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1062-1078, 1999. [Pevn2010]T. Pevny, P. Bas, and J. Fridrich, “Steganalysis by subtractive pixel adjacency matrix,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 215-224, 2010. [Prov2003]N. Provos and P. Honeyman, “Hide and seek: an introduction to steganography,” IEEE Security & Privacy, vol. 1, no. 3, pp. 32-44, 2003. [Qian2017]Z. Qian, H. Zhou, W. Zhang, and X. Zhang, "Robust steganography using texture synthesis", Proceeding of the Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, vol. 1, no. 21-23, pp. 25-33, 2017. [Rudo2016]C. Rudolph, “Recent developments in texture synthesis,” Lecture Notes in Informatics (LNI), pp. 2175-2185, 2016. [Wang2004]Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, “Image quality assessment: from error visibility to structural similarity,” IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600-612, 2004. [Wu2010]H. C. Wu, H. C. Wang, C. S. Tsai, and C. M. Wang, “Reversible image steganographic scheme via Predictive coding,” Displays, vol. 31, no. 1, pp. 35-43, 2010. [Wu2015]K. C. Wang and C. M. Wang, "Steganography using reversible texture synthesis," IEEE Transactions on Image Processing, vol. 24, no. 1, pp. 130-139, 2015. [Yu2011]C. M. Yu, K. C. Wu, and C. M. Wang, “A distortion-free data hiding scheme for high dynamic range images,” Displays, vol. 32 no. 5, pp. 225-236, 2011. [Zhou2017]H. Zhou, K. Chen, W. Zhang, and N. Yu, “Comments on steganography using reversible texture synthesis”, IEEE Transactions on Image Processing, vol. 26, no. 4, pp. 1623-1625, 2017.
|