메뉴 건너뛰기




Volumn 25, Issue 3, 2004, Pages 301-309

An iterative method of palette-based image steganography

Author keywords

Data hiding; Palette based image; Security; Steganography; Stego image

Indexed keywords

ERROR ANALYSIS; IMAGE ANALYSIS; ITERATIVE METHODS;

EID: 0347355321     PISSN: 01678655     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.patrec.2003.10.013     Document Type: Article
Times cited : (49)

References (26)
  • 1
    • 0032307120 scopus 로고    scopus 로고
    • Using the fractal code to watermark images
    • Bas P. Chassery J.-M. Davoine F. Using the fractal code to watermark images Proc. ICIP 1 1998 469-473
    • (1998) Proc. ICIP , vol.1 , pp. 469-473
    • Bas, P.1    Chassery, J.-M.2    Davoine, F.3
  • 2
    • 0036709226 scopus 로고    scopus 로고
    • Geometrically invariant watermarking using feature points
    • Bas P. Chassery J.-M. Macq B. Geometrically invariant watermarking using feature points IEEE Trans. Image Process. 11 9 2002 1014-1028
    • (2002) IEEE Trans. Image Process. , vol.11 , Issue.9 , pp. 1014-1028
    • Bas, P.1    Chassery, J.-M.2    Macq, B.3
  • 5
    • 0032187555 scopus 로고    scopus 로고
    • A virtual image cryptosystem based upon vector quantization
    • Chen T.-S. Chang C.-C. Hwang M.-S. A virtual image cryptosystem based upon vector quantization IEEE Trans. Image Process. 7 10 1998 1485-1488
    • (1998) IEEE Trans. Image Process. , vol.7 , Issue.10 , pp. 1485-1488
    • Chen, T.-S.1    Chang, C.-C.2    Hwang, M.-S.3
  • 8
    • 0347390532 scopus 로고    scopus 로고
    • Applications of data hiding in digital images
    • Brisbane, Australia, August 1999
    • Fridrich, J., 1999a. Applications of data hiding in digital images. Tutorial for The ISSPA'99, Brisbane, Australia, August 1999
    • (1999) Tutorial for The ISSPA'99
    • Fridrich, J.1
  • 10
    • 84940448623 scopus 로고    scopus 로고
    • Secure steganographic methods for palette images
    • LNCS New York: Springer-Verlag
    • Fridrich J. Du J. Secure steganographic methods for palette images Proc. the Third Inform. Hiding Workshop LNCS vol. 1768 2000 47-60 Springer-Verlag New York
    • (2000) Proc. the Third Inform. Hiding Workshop , vol.1768 , pp. 47-60
    • Fridrich, J.1    Du, J.2
  • 11
    • 35248884299 scopus 로고    scopus 로고
    • Steganalysis of JPEG Images: Breaking the F5 Algorithm
    • Noordwijkerhout, The Netherlands, October 2002
    • Fridrich, J., Goljan, M., Hogea, D., 2002. Steganalysis of JPEG Images: Breaking the F5 Algorithm, 5th Information Hiding Workshop, Noordwijkerhout, The Netherlands, October 2002, pp. 310-323
    • (2002) 5th Information Hiding Workshop , pp. 310-323
    • Fridrich, J.1    Goljan, M.2    Hogea, D.3
  • 12
    • 0030383845 scopus 로고    scopus 로고
    • Hidden signatures in images
    • Hsu C.-T. Wu J.-L. Hidden signatures in images Proc. ICIP 1996 223-226
    • (1996) Proc. ICIP , pp. 223-226
    • Hsu, C.-T.1    Wu, J.-L.2
  • 13
    • 0032292654 scopus 로고    scopus 로고
    • A digital watermark based on wavelet transform and its robustness on image processing
    • Inoue H. Miyazaki A. Yamamoto A. Katsura T. A digital watermark based on wavelet transform and its robustness on image processing Proc. ICIP 2 1998 391-395
    • (1998) Proc. ICIP , vol.2 , pp. 391-395
    • Inoue, H.1    Miyazaki, A.2    Yamamoto, A.3    Katsura, T.4
  • 14
    • 84904224992 scopus 로고    scopus 로고
    • Steganalysis of images created using current steganography software
    • LNCS Springer-Verlag
    • Johnson N.F. Jajodia S. Steganalysis of images created using current steganography software Proc. the Second Inform. Hiding Workshop LNCS vol. 1525 1998 273-289 Springer-Verlag
    • (1998) Proc. the Second Inform. Hiding Workshop , vol.1525 , pp. 273-289
    • Johnson, N.F.1    Jajodia, S.2
  • 15
    • 0031996445 scopus 로고    scopus 로고
    • Exploring steganography: Seeing the unseen
    • February
    • Johnson N.F. Jajodia S. Exploring steganography: seeing the unseen IEEE Comput. February 1998 26-34
    • (1998) IEEE Comput. , pp. 26-34
    • Johnson, N.F.1    Jajodia, S.2
  • 17
    • 85030922355 scopus 로고    scopus 로고
    • Gifshuffle 2.0. Available from
    • Kwan, M., 2003. Gifshuffle 2.0. Available from
    • (2003)
    • Kwan, M.1
  • 19
    • 85030921276 scopus 로고    scopus 로고
    • EZ Stego, Stego Online, Stego. Available from
    • Machado, R., 1997. EZ Stego, Stego Online, Stego. Available from
    • (1997)
    • Machado, R.1
  • 23
    • 0030385474 scopus 로고    scopus 로고
    • Phase watermarking of digital images
    • Solachidis V. Boland F.M. Phase watermarking of digital images Proc. ICIP 3 1996 239-242
    • (1996) Proc. ICIP , vol.3 , pp. 239-242
    • Solachidis, V.1    Boland, F.M.2
  • 24
    • 0035510211 scopus 로고    scopus 로고
    • Circularly symmetric watermark embedding in 2-D DFT domain
    • Solachidis V. Pitas I. Circularly symmetric watermark embedding in 2-D DFT domain IEEE Trans. Image Process. 10 11 2001 1741-1753
    • (2001) IEEE Trans. Image Process. , vol.10 , Issue.11 , pp. 1741-1753
    • Solachidis, V.1    Pitas, I.2
  • 25
  • 26
    • 0037410595 scopus 로고    scopus 로고
    • A steganographic method for images by pixel-value differencing
    • Wu D.C. Tsai W.H. A steganographic method for images by pixel-value differencing Pattern Recognition Lett. 24 2003 1613-1626
    • (2003) Pattern Recognition Lett. , vol.24 , pp. 1613-1626
    • Wu, D.C.1    Tsai, W.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.