|
[CHAN03] C.C. Chang, J.Y. Hsiao, and C.S. Chan, “Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy,” Pattern Recognition, vol. 36, 2003, pp. 1583–1595. [CHAN04a] C.K. Chan and L.M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition, vol. 37, 2004, pp. 469–474. [CHAN04b] C.C. Chang and W.H. Tseng, “A steganographic method for digital images using side match,” Pattern Recognition Letters, vol. 25, 2004, pp. 1434–1437. [FAN13] L. Fan, T. Gao, Y. Cao, “Improving the embedding efficiency of weight matrix-based steganography for grayscale images”, Comput. Elect. Eng. 39 (2013) 873–881. [FRID01] J. Fridrich, M. Goljan, R. Du, “Detecting LSB steganography in color, and gray-scale images,” IEEE Multimedia, vol. 8, 2001, pp. 22–28. [JANA16] B. Jana, “High payload reversible data hiding scheme using weighted matrix”, Optik 127 (2016) 3347–3358. [JUNG09] K.H. Jung and K.Y. Yoo, “Data hiding method using image interpolation,” Computer Standards & Interfaces, vol. 31, 2009, pp. 465–470. [KIM14a] C. Kim and C.N. Yang, “Steganography based on grayscale images using (5, 3) Hamming code,” 13-th International Workshop on Digital-forensics and Watermarking (IWDW 2014), vol. LNCS 9023, 2014, pp. 588–598. [KIM14b] C. Kim and C.N. Yang, “Data hiding based on overlapped pixels using hamming code,” Multimedia Tools and Applications, 2014, doi: 10.1007 /s11042-014-2355-x. [LIN11] H.F. Lin, J.H. Chang, C.Y. Gun, and C.Y. Chen, “A low distortion information hiding method based on (5, 3) Code,” Inter. journal of innovative computing, and information control, 2011, pp. 1–10. [NGUY15] T.S. Nguyen, C.C. Chang, “A reversible data hiding scheme based on the Sudoku technique”, Displays 39 (2015) 109–116. [RAD16] R.M. Rad, K. Wong, J.M. Guo, “Reversible data hiding by adaptive group modification on histogram of prediction errors”, Signal Process. 125 (2016) 315–328. [WANG00] R.Z. Wang, C.F. Lin, and J.C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, vol. 11, 2000, pp. 671–683. [WU03] D.C. Wu and W.H. Tsai, “A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters, vol. 24, 2003, pp. 1613–1626. [XIA14a] Z. Xia, X. Wang, X. Sun, Q. Liu, and N. Xiong, “Steganalysis of LSB matching using differences between nonadjacent pixels,” Multimedia Tools and Applications, 2014, doi: 10.1007/s11042-014-2381-8. [XIA14b] Z. Xia, X. Wang, X. Sun, and B. Wang, “Steganalysis of least significant bit matching using multi-order differences,” Security and Communication Networks, vol. 7, 2014, pp. 1283–1291. [YANG06a] C.H. Yang and S.J. Wang, “Weighted bipartite graph for locating optimal LSB substitution for secret embedding,” Journal of Discrete Mathematical Sciences & Cryptography, vol. 9, 2006, pp. 153–164. [YANG06b] C.H. Yang and C.Y. Weng, “A steganographic method for digital images by multi-pixel differencing. International Computer Symposium 2006 (ICS2006), 2006, pp. 831–836. [YANG13] C.N. Yang, C.C. Lin, and C.C. Chang, “Steganography and watermarking,” Nova Science Publishers Inc., ISBN: 978-1-62618-317-9, 2013. [ZHAN07] W. Zhang, S. Wang, and X. Zhang, “Improving embedding efficiency of covering codes for applications in steganography,” IEEE Commun. Lett., vol. 11, 2007, pp. 680–682.
|