|
[1]X. Zhang, S. Wang, “Efficient steganographic embedding by exploiting modification direction.” IEEE Communications Letters, vol. 10, no. 11, pp. 781-783, Nov. 2006. [2]H. J. Kim, C. Kim, Y. Choi, S. Wang, X. Zhang, “Improved modification direction methods,” Computers & Mathematics with Applications, vol. 60, no. 2, pp. 319–325, 2010. [3]T. D. Kieu, C. C. Chang, “A steganographic scheme by fully exploiting modification directions.” Expert system with applications, vol. 38, no. 8, pp. 10648-10657, 2011. [4]C. C. Chang, Y. Liu and T. S. Nguyen, “A Novel Turtle Shell Based Scheme for Data Hiding,” 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 89-93, 2014. [5]Y. Liu, C. C. Chang, T. S. Nguyen, “High capacity turtle shell-based data hiding,” IET Image Process, vol. 10, no. 2, pp. 130–137, 2016. [6]Qiang Jin, Zhihong Li, Chin Chen Chang, Anhong Wang, Li Liu, “Minimizing turtle-shell matrix based stego image distortion using particle swarm optimization,” International Journal of Network Security, vol. 19, no. 1, pp. 154–162, 2017. [7]L. Liu, C. C. Chang, A. Wang, “Data hiding based on extended turtle shell matrix construction method,” Multimedia Tools Appl, vol. 76, pp. 12233–12250, 2017. [8]X. Z. Xie, C. C. Lin, C. C. Chang, “Data hiding based on a two-layer turtle shell matrix,” Symmetry, vol. 10, no. 2, pp. 47, 2018. [9]J. H. Horng, J. Lin, Y. J. Liu, C. C. Chang, “3D Multilayered Turtle Shell Models for Image Steganography,” Computer Modeling in Engineering & Sciences, vol. 125, no. 2, pp. 879-906, 2020. [10]S. Kurup, A. Rodrigues and A. Bhise, “Data hiding scheme based on octagon shaped shell,” 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1982-1986, 2015. [11]H. S. Leng, “Generalized scheme based on octagon-shaped shell for data hiding in steganographic applications,” Symmetry, vol. 11, no. 6, pp. 1-10, 2019. [12]C. C. Chang, Y. C. Chou and T. D. Kieu, “An Information Hiding Scheme Using Sudoku,” 2008 3rd International Conference on Innovative Computing Information and Control, pp. 17-17, 2008. [13]M. He, Y. Liu, C. C. Chang and M. He, "A Mini-Sudoku Matrix-Based Data Embedding Scheme with High Payload," in IEEE Access, vol. 7, pp. 141414-141425, 2019. [14]W. Hong, “Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique,” Information Sciences, vol. 221, pp. 473–489, 2013. [15]X. Liao, S. Guo, J. Yin, H. Wang, X. Li, A. K. Sangaiah, “New cubic reference table based image steganography,” Multimedia Tools Appl, vol. 77, pp. 10033–10050, 2018. [16]J. Lin, J. H. Horng, Y. Liu and C. C. Chang, “An Anisotropic Reference Matrix for Image Steganography,” Journal of Visual Communication and Image Representation, vol. 74, 102969, January 2021. [17]T. S. Nguyen, C. C. Chang, “A reversible data hiding scheme based on the Sudoku technique,” Displays, vol. 39, pp. 109-116, 2015. [18]C. C. Chang, C. T. Li, and K. Chen, “Privacy-preserving reversible information hiding based on arithmetic of quadratic residues,” IEEE Access, vol. 7, no. 1, pp. 54117-54132, 2019. [19]C. C. Chang, C. T. Li, Y. Q. Shi, “Privacy-aware reversible watermarking in cloud computing environments,” IEEE Access, vol. 6, no. 1, pp. 70720-70733, 2018. [20]Y. Shi, X. Li, X. Zhang, H. Wu and B. Ma, “Reversible data hiding: Advances in the past two decades,” IEEE Access, vol. 4, pp. 3210-3237, 2016. [21]J. H. Horng, C. C. Chang, G. L. Li, “Steganography using Quotient Value Differencing and LSB Substitution for AMBTC Compressed Images,” IEEE Access, vol. 8, pp. 129347-129358, 2020. [22]F. Huang, X. Qu, H. J. Kim and J. Huang, “Reversible data hiding in JPEG images,” IEEE Transactions on Circuits Systems for Video Technology, vol. 26, no. 9, pp.1610–1621, 2016. [23]Y. Li, S. Yao, K. Yang, Y. Tan and Q. Zhang, “A High-Imperceptibility and Histogram-Shifting Data Hiding Scheme for JPEG Images,” in IEEE Access, vol. 7, pp. 73573-73582, 2019. [24]Y. Linde, A. Buzo, R. Gray, An Algorithm for Vector Quantizer Design, in IEEE Transactions on Communications, vol. 28, no. 1, pp.84-95, January 1980. [25]T. Kim, “Side match and overlap match vector quantizers for images,” in IEEE Transactions on Image Processing, vol. 1, no. 2, pp. 170-185, April 1992. [26]C. C. Chang, T. D. Kieu, W. C. Wu, A lossless data embedding technique by joint neighboring coding, Pattern Recognition, vol. 42, pp.1597-1603, 2009. [27]J. X. Wang, Z. M. Lu, “A path optional lossless data hiding scheme based on VQ joint neighboring coding,” Information Sciences, vol. 179, no.19, pp.3332-3348, 2009. [28]Z. H. Wang, C. C. Chang, K. N. Chen, M. C. Li, “An encoding method for both image compression and data lossless information hiding,” Journal of Systems and Software, vol. 83, pp.2073-2082, 2010. [29]C. C. Chang, G. M. Chen, M. H. Lin, “Information hiding based on search-order coding for VQ indices,” Pattern Recognition Letters, vol. 25, no. 11, pp.1253-1261, 2004 [30]C. H. Hsieh, J. C. Tsai, “Lossless compression of VQ index with search-order coding, in IEE Transactions on Image Processing,” vol. 5, no. 11, pp.1579-1582, 1996. [31]W. J. Wang, C. T. Huang, C. M. Liu, P. C. Su, S. J. Wang, “Data embedding for vector quantization image processing on the basis of adjoining state-codebook mapping,” Information Sciences, vol. 246, pp. 69-82, 2013. [32]C. Qin, C. C. Chang, Y. C. Chen, “Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism,” Signal Processing, vol. 93, pp.2687-2695, 2013. [33]Chih Yang Lin, Chin Chen Chang, “Hiding data in VQ-compressed images using dissimilar pairs.” Journal of Computers, vol. 17, no. 2, pp. 3-10, July 2006. [34]Chin Chen Chang, Chih Yang Lin, Yi Pei Hsieh, “Data hiding for vector quantization images using mixed-base notation and dissimilar patterns without loss of fidelity,” Information Sciences, vol. 201, pp. 70-79, 2012. [35]Chin Chen Chang, Wen Chuan Wu, “A Steganographic Method for Hiding Secret Data Using Side Match Vector Quantization,” IEICE Trans. Inform. Syst., vol. E88-D, pp. 2159–2167, 2005. [36]Lingfei Wang, Zhibin Pan, Xiaoxiao Ma, Sen Hu, “A novel high-performance reversible data hiding scheme using SMVQ and improved locally adaptive coding method,” Journal of Visual Communication and Image Representation, vol. 25, no. 2, pp. 454-465, 2014. [37]Chin Chen Chang, Thai Son Nguyen, Chia-Chen Lin, “A reversible compression code hiding using SOC and SMVQ indices,” Information Sciences, vol. 300, pp. 85-99, 2015. [38]Lingfei Wang, Zhibin Pan, Ruoxin Zhu, “A novel reversible data hiding scheme by introducing current state codebook and prediction strategy for joint neighboring coding,” Multimedia Tools Appl, vol. 76, pp. 26153–26176, 2017. [39]Peyman Rahmani, Gholamhossein Dastghaibyfard, “An efficient histogram-based index mapping mechanism for reversible data hiding in VQ-compressed images,” Information Sciences, vol. 435, pp. 224-239, 2018. [40]https://www.pexels.com/zh-tw/. [41]https://unsplash.com/. [42]https://www.kdccoffee.com/. [43]J. Fridrich and J. Kodovsky, “Rich Models for Steganalysis of Digital Images,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 868-882, June 2012. [44]Ye Dengpan, Jiang Shunzhi, Li Shiyu & Liu ChangRui, “Faster and transferable deep learning steganalysis on GPU,” J Real-Time Image Proc, vol. 16, pp. 623–633, 2019. [45]Zhang, X., Wang, S., “Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security,” Pattern Recognition Letters, vol. 25, no. 3,331-339, 2004.
|