|
[1] F.A.P. Petitcolas, R.J. Anderson and M.G. Kuhn, “Information Hiding – A Survey,” In The Proceedings of The IEEE, Special Issue on Protection of Multimedia Content, pp. 1062-1078, 1999. [2] J. Mielikainen, “LSB Matching Revisited,” IEEE Signal Processing Letter, Vol. 13, no.5, pp. 285-287, 2006. [3] X. Zhang and S. Wang, “Efficient Steganographic Embedding by Exploiting Modification Direction,” IEEE Communications Letters, Vol. 10, No. 11, pp. 1-3, 2006. [4] J.H. Hwang, J.W. Kim and J.U. Choi, “A Reversible Watermarking Based on Histogram Shifting,” IWDW 2006, LNCS 4283, pp. 348-361, 2006. [5] C.F. Lee, Y.R. Wang and C.C. Chang, “A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction,” IIHMSP 2007, Vol. 1, pp. 497-500, 2007. [6] X. Li, T. Zeng and B. Yang, “Improvement of The Embedding Efficiency of LSB Matching by Sum and Difference Covering Set,” in Proc. IEEE ICME, pp. 209-212, 2008. [7] X. Li, B. Yang, D. Cheng and T. Zeng, “A Generalization of LSB Matching,” IEEE Signal Processing Letters, Vol. 16, No. 2, pp. 69-72, 2009. [8] W.C. Kuo, L.C. Wuu, C.N. Shyi and S.H. Kuo, “A Data Hiding Scheme with High Embedding Capacity Based on General Improving Exploiting Modification Direction method,” Ninth International Conference on Hybrid Intelligent Systems Vol. 3, pp. 69-72, 2009. [9] W.C. Kuo, J.C. Cheng and C.C. Wang, “More Efficient Steganographic Embedding and Capacity-Improvement by Generalized Exploiting Modification Direction Method,” Fourth International Conference on Innovative Computing, Information and Control, PID966507, 2009. [10] W.C. Kuo and C.C. Wang, ”A Steganographc Scheme Based on Formula Fully Exploiting,” IEICE TRANS. FUNDAMENTALS, Vol.E96-A, NO. 11, 2013. [11] W.C. Kuo, “A Data Hiding Scheme Based on Square Formula Fully Exploiting Modification Directions,” Journal of Information Hiding and Multimedia Signal Processing, Vol.4, No.3, pp. 127-136, 2013. [12] W.C. Kuo and C.C. Wang, “Data Hiding Based on Generalized Exploiting Modification Direction Method,” Imaging Science Journal, Vol. 61, No. 6, pp. 484‐490, 2013. [13] C.C. Chang, Y.J. Liu, T.S. Nguyen, “A Novel Turtle Shell Based Scheme for Data Hiding,” Proc. Tenth Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP’14), pp. 89–93, 2014. [14] C.C. Chang, Y.J. Liu, T.S. Nguyen, “High Capacity Turtle Shell-Based Data Hiding,” IET Image Process. Vol. 10, pp.130-137, 2016. [15] 呂慈純、張真誠、陸哲明,”Multimedia Security Technology,” 全華圖書, 2007.
|