-
1
-
-
0032680807
-
Information hiding - A survey
-
July
-
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding - A survey," Proc. IEEE, vol. 87, pp. 1062-1078, July 1999.
-
(1999)
Proc. IEEE
, vol.87
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
3
-
-
0032682054
-
Spread spectrum image steganography
-
Aug.
-
L. M. Marvel, J. C. G. Boncelet, and C. T. Retter, "Spread spectrum image steganography," IEEE Trans. Image Processing, vol. 8, pp. 1075-1083, Aug. 1999.
-
(1999)
IEEE Trans. Image Processing
, vol.8
, pp. 1075-1083
-
-
Marvel, L.M.1
Boncelet, J.C.G.2
Retter, C.T.3
-
4
-
-
0000370347
-
Video-steganography: How to secretly embed a signature in a picture
-
K. Matsui and K. Tanaka, "Video-steganography: How to secretly embed a signature in a picture," in Proc. IMA Intellectual Property Project, vol. 1, 1994, pp. 187-205.
-
(1994)
Proc. IMA Intellectual Property Project
, vol.1
, pp. 187-205
-
-
Matsui, K.1
Tanaka, K.2
-
5
-
-
0033312461
-
Multi-level data hiding for digital image and video
-
Boston, MA
-
M. Wu, H. Yu, and A. Gelman, "Multi-level data hiding for digital image and video," in Proc. SPIE Photonics East, vol. 3845, Boston, MA, 1999, pp. 10-21.
-
(1999)
Proc. SPIE Photonics East
, vol.3845
, pp. 10-21
-
-
Wu, M.1
Yu, H.2
Gelman, A.3
-
6
-
-
2942565828
-
-
M. Kwan. (1998) GIF Colormap Steganography. [Online]. Available: http://www.darkside.com.au/gifshuffle/
-
(1998)
-
-
Kwan, M.1
-
7
-
-
2942565829
-
-
R. Machado. (1997) EzStego, Stego Online, Stego, [Online]. Available: http://www.stego.com
-
(1997)
-
-
Machado, R.1
-
8
-
-
2942627366
-
-
H. Repp. (1996) Hide4PGP. [Online]. Available: http://www.rugeley.demon.co.uk/security/hide4pgp.zip
-
(1996)
-
-
Repp, H.1
-
9
-
-
2942616633
-
-
A. Brown. (1996) S-Tools for Windows. [Online]. Available: ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools4.zip
-
(1996)
-
-
Brown, A.1
-
10
-
-
2942586837
-
-
C. Maroney. (1994-1997) Hide and Seek. [Online]. Available: ftp://ftp.csua.berkeley.edu/pub/cypherpunks/steganography/hdsk41b.zip
-
(1994)
-
-
Maroney, C.1
-
11
-
-
84904224992
-
-
New York: Springer-Verlag; Lecture Notes in Computer Science
-
N. F. Johnson and S. Jajodia, "Steganalysis of images created using current steganography software," New York: Springer-Verlag, 1998, vol. 1525, Lecture Notes in Computer Science, pp. 273-289.
-
(1998)
Steganalysis of Images Created Using Current Steganography Software
, vol.1525
, pp. 273-289
-
-
Johnson, N.F.1
Jajodia, S.2
-
12
-
-
84940448623
-
Secure steganographic methods for palette images
-
J. Fridrich and R. Du, "Secure steganographic methods for palette images," in Proc. 3rd Int. Workshop Information Hiding, Dresden, Germany, 1999, pp. 47-60.
-
Proc. 3rd Int. Workshop Information Hiding, Dresden, Germany, 1999
, pp. 47-60
-
-
Fridrich, J.1
Du, R.2
-
13
-
-
0031384941
-
Marking text documents
-
Santa Barbara, CA
-
N. F. Maxemchuk and S. Low, "Marking text documents," in Proc. Int. Conf. Image Processing, vol. 3, Santa Barbara, CA, 1997, p. 13.
-
(1997)
Proc. Int. Conf. Image Processing
, vol.3
, pp. 13
-
-
Maxemchuk, N.F.1
Low, S.2
-
14
-
-
0034515656
-
Data hiding in digital binary images
-
New York, NY
-
M. Wu, E. Tang, and B. Liu, "Data hiding in digital binary images," in Proc. Int. Conf. Multimedia and Expo, vol. 1, New York, NY, 2000, pp. 393-396.
-
(2000)
Proc. Int. Conf. Multimedia and Expo
, vol.1
, pp. 393-396
-
-
Wu, M.1
Tang, E.2
Liu, B.3
-
15
-
-
0036688310
-
A secure data hiding scheme for binary images
-
Aug.
-
Y.-C. Tseng, Y.-Y. Chen, and H.-K. Pan, "A secure data hiding scheme for binary images," IEEE Trans. Commun., vol. 50, pp. 1227-1231, Aug. 2002.
-
(2002)
IEEE Trans. Commun.
, vol.50
, pp. 1227-1231
-
-
Tseng, Y.1
Chen, Y.-Y.2
Pan, H.-K.3
|