메뉴 건너뛰기




Volumn 42, Issue 10, 2003, Pages 2886-2892

Public-key image steganography using discrete cosine transform and quadtree partition vector quantization coding

Author keywords

Adleman algorithm; Cover image; Hamming code; Joint photograph experts group (JPEG); Public key; Rivest; Shamir; Stego image

Indexed keywords

ALGORITHMS; COSINE TRANSFORMS; IMAGE CODING; IMAGE COMPRESSION; IMAGE QUALITY; INTERNET;

EID: 0345377853     PISSN: 00913286     EISSN: None     Source Type: Journal    
DOI: 10.1117/1.1604783     Document Type: Article
Times cited : (17)

References (21)
  • 3
    • 0035472155 scopus 로고    scopus 로고
    • Deteting LSB steganography in color and gray-scale images
    • J. Fridrich, M. Goljan, and R. Du, "Deteting LSB steganography in color and gray-scale images," IEEE Trans. Multimedia 8(4), 22-28 (2001).
    • (2001) IEEE Trans. Multimedia , vol.8 , Issue.4 , pp. 22-28
    • Fridrich, J.1    Goljan, M.2    Du, R.3
  • 4
    • 0035167458 scopus 로고    scopus 로고
    • Analysis of LSB based image steganography techniques
    • R. Chandramouli and N. Memon, "Analysis of LSB based image steganography techniques," Proc. Image Process. 3, 1019-1022 (2001).
    • (2001) Proc. Image Process. , vol.3 , pp. 1019-1022
    • Chandramouli, R.1    Memon, N.2
  • 7
    • 0037508344 scopus 로고    scopus 로고
    • Invisibility and application functionalities in perceptual watermarking-an overview
    • C. D. Vleeschouwer, J. F. Delaigle, and B. Macq, "Invisibility and application functionalities in perceptual watermarking-An overview," Proc. IEEE 90(1), 64-77 (2002).
    • (2002) Proc. IEEE , vol.90 , Issue.1 , pp. 64-77
    • Vleeschouwer, C.D.1    Delaigle, J.F.2    Macq, B.3
  • 8
    • 0032785523 scopus 로고    scopus 로고
    • Hidden digital watermarks in images
    • C. T. Hsu and J. L. Wu, "Hidden digital watermarks in images," IEEE Trans. Image Process. 8(1), 58-68 (1999).
    • (1999) IEEE Trans. Image Process. , vol.8 , Issue.1 , pp. 58-68
    • Hsu, C.T.1    Wu, J.L.2
  • 9
    • 0345510755 scopus 로고    scopus 로고
    • A bi-polar multiple-base data hiding technique on information security and authentication
    • H. M. Chao and Y. S. Tsai, "A bi-polar multiple-base data hiding technique on information security and authentication," IPPR Conf. Comput. Vision, Graphics Image Process., pp. 307-313 (2000).
    • (2000) IPPR Conf. Comput. Vision, Graphics Image Process. , pp. 307-313
    • Chao, H.M.1    Tsai, Y.S.2
  • 10
    • 0033309034 scopus 로고    scopus 로고
    • Data hiding in image with adaptive numbers of least significant bits based on the human visual system
    • (Oct.)
    • W. N. Lie and L. C. Chang, "Data hiding in image with adaptive numbers of least significant bits based on the human visual system," IEEE Intl. Conf. Image Process., 28, 286-290 (Oct. 1999).
    • (1999) IEEE Intl. Conf. Image Process. , vol.28 , pp. 286-290
    • Lie, W.N.1    Chang, L.C.2
  • 11
    • 0034514476 scopus 로고    scopus 로고
    • Hiding data in images by optimal moderately-significant-bit replacement
    • R. Z. Wang, C. F. Lin, and J. C. Lin, "Hiding data in images by optimal moderately-significant-bit replacement," Electron. Lett. 36(25), 2069-2070 (2000).
    • (2000) Electron. Lett. , vol.36 , Issue.25 , pp. 2069-2070
    • Wang, R.Z.1    Lin, C.F.2    Lin, J.C.3
  • 12
    • 0344217010 scopus 로고    scopus 로고
    • Steganography: An efficient data hiding method
    • Y. C. Hou and Y. F. Chiao, "Steganography: an efficient data hiding method," J. Technol. 15(3), 363-372 (2000).
    • (2000) J. Technol. , vol.15 , Issue.3 , pp. 363-372
    • Hou, Y.C.1    Chiao, Y.F.2
  • 13
    • 0032206939 scopus 로고    scopus 로고
    • Data hiding in images via multiple-based number conversion and lossy compression
    • D. C. Wu and W. H. Tsai, "Data hiding in images via multiple-based number conversion and lossy compression," IEEE Trans. Consum. Electron. 44(4), 1406-1412 (1998).
    • (1998) IEEE Trans. Consum. Electron. , vol.44 , Issue.4 , pp. 1406-1412
    • Wu, D.C.1    Tsai, W.H.2
  • 14
    • 0032187555 scopus 로고    scopus 로고
    • A virtual image cryptosystem based upon vector quantization
    • T. S. Chen, C. C. Chang, and M. S. Hwang, "A virtual image cryptosystem based upon vector quantization," IEEE Trans. Image Process. 7(10), 1485-1488 (1998).
    • (1998) IEEE Trans. Image Process. , vol.7 , Issue.10 , pp. 1485-1488
    • Chen, T.S.1    Chang, C.C.2    Hwang, M.S.3
  • 15
    • 0032631520 scopus 로고    scopus 로고
    • Low-complexity fractal-based image compression using two-stage search strategy
    • (June)
    • C. C. Wang and C. C. Chen, "Low-complexity fractal-based image compression using two-stage search strategy," Opt. Eng. 38(6), 1006-1013 (June 1999).
    • (1999) Opt. Eng. , vol.38 , Issue.6 , pp. 1006-1013
    • Wang, C.C.1    Chen, C.C.2
  • 16
    • 0017018484 scopus 로고
    • New directions in cryptograph
    • (Nov.)
    • W. Diffie and M. E. Hellman, "New directions in cryptograph," IEEE Trans. Inf. Theory IT-22, 644-654 (Nov. 1976).
    • (1976) IEEE Trans. Inf. Theory , vol.IT-22 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 17
    • 0031335088 scopus 로고    scopus 로고
    • Fast public-key watermarking of compressed video
    • (Oct.)
    • F. Hartung and B. Girod, "Fast public-key watermarking of compressed video," IEEE Intl. Conf. Image Process. 1, 528-531 (Oct. 1997).
    • (1997) IEEE Intl. Conf. Image Process. , vol.1 , pp. 528-531
    • Hartung, F.1    Girod, B.2
  • 19
    • 0028526033 scopus 로고
    • Security of RSA-type cryptoystem over elliptic curves against Hastad attack
    • H. Kuwakado and K. Koyama, "Security of RSA-type cryptoystem over elliptic curves against Hastad attack," Electron. Lett. 30(22), 1843-1844 (1994).
    • (1994) Electron. Lett. , vol.30 , Issue.22 , pp. 1843-1844
    • Kuwakado, H.1    Koyama, K.2
  • 21
    • 0029540975 scopus 로고
    • Security estimates for 512-bit RSA
    • M. J. B. Robshaw, "Security estimates for 512-bit RSA," WESCON'95 Conf. Record, pp. 409-412 (1995).
    • (1995) WESCON'95 Conf. Record , pp. 409-412
    • Robshaw, M.J.B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.