-
3
-
-
0035472155
-
Deteting LSB steganography in color and gray-scale images
-
Fridrich J., Goljan M., and Du R. Deteting LSB steganography in color and gray-scale images. IEEE Transactions on Multimedia 8 4 (2001) 22-28
-
(2001)
IEEE Transactions on Multimedia
, vol.8
, Issue.4
, pp. 22-28
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
4
-
-
4444342040
-
Secret image sharing with steganography and authentication
-
Lin C.C., and Tsai W.H. Secret image sharing with steganography and authentication. The Journal of System and Software 73 (2004) 405-414
-
(2004)
The Journal of System and Software
, vol.73
, pp. 405-414
-
-
Lin, C.C.1
Tsai, W.H.2
-
6
-
-
10644225222
-
A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection
-
Chen W.Y., and Chen C.H. A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection. Pattern Recognition 38 4 (2005) 587-598
-
(2005)
Pattern Recognition
, vol.38
, Issue.4
, pp. 587-598
-
-
Chen, W.Y.1
Chen, C.H.2
-
7
-
-
10044224284
-
Secure semi-blind watermarking based on iteration mapping and image features
-
Ni R., Ruan Q., and Cheng H.D. Secure semi-blind watermarking based on iteration mapping and image features. Pattern Recognition 38 3 (2005) 357-368
-
(2005)
Pattern Recognition
, vol.38
, Issue.3
, pp. 357-368
-
-
Ni, R.1
Ruan, Q.2
Cheng, H.D.3
-
9
-
-
14844354093
-
Steganography of capacity required using modulo operator for embedding secret image
-
Wang S.J. Steganography of capacity required using modulo operator for embedding secret image. Applied Mathematics and Computation 164 (2005) 99-116
-
(2005)
Applied Mathematics and Computation
, vol.164
, pp. 99-116
-
-
Wang, S.J.1
-
10
-
-
0033309034
-
Data hiding in image with adaptive numbers of least significant bits based on the human visual system
-
Lie W.N., and Chang L.C. Data hiding in image with adaptive numbers of least significant bits based on the human visual system. IEEE International Conference on Image Processing 28 (1999) 286-290
-
(1999)
IEEE International Conference on Image Processing
, vol.28
, pp. 286-290
-
-
Lie, W.N.1
Chang, L.C.2
-
11
-
-
0034514476
-
Hiding data in images by optimal moderately-significant-bit replacement
-
Wang R.Z., Lin C.F., and Lin J.C. Hiding data in images by optimal moderately-significant-bit replacement. Electronics Letters 36 25 (2000) 2069-2070
-
(2000)
Electronics Letters
, vol.36
, Issue.25
, pp. 2069-2070
-
-
Wang, R.Z.1
Lin, C.F.2
Lin, J.C.3
-
12
-
-
0344217010
-
Steganography: an efficient data hiding method
-
Hou Y.C., and Chiao Y.F. Steganography: an efficient data hiding method. Journal of Technology 15 3 (2000) 363-372
-
(2000)
Journal of Technology
, vol.15
, Issue.3
, pp. 363-372
-
-
Hou, Y.C.1
Chiao, Y.F.2
-
13
-
-
0032206939
-
Data hiding in images via multiple-based number conversion and lossy compression
-
Wu D.C., and Tsai W.H. Data hiding in images via multiple-based number conversion and lossy compression. IEEE Transactions on Consumer Electronics 44 4 (1998) 1406-1412
-
(1998)
IEEE Transactions on Consumer Electronics
, vol.44
, Issue.4
, pp. 1406-1412
-
-
Wu, D.C.1
Tsai, W.H.2
-
18
-
-
0035510211
-
Circularly symmetric watermark embedding in 2-D DFT domain
-
Solachidis V., and Pitas I. Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Transactions on Image Processing 10 465 (2001) 1741-1753
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.465
, pp. 1741-1753
-
-
Solachidis, V.1
Pitas, I.2
-
19
-
-
0027798110
-
Embedded image coding using zerotrees of wavelet coefficients
-
Shapior J.M. Embedded image coding using zerotrees of wavelet coefficients. IEEE Transactions on Signal Processing 41 12 (1993) 3445-3462
-
(1993)
IEEE Transactions on Signal Processing
, vol.41
, Issue.12
, pp. 3445-3462
-
-
Shapior, J.M.1
-
20
-
-
0030173121
-
A new, fast, and efficient image codec based on set partitioning in hierarchical trees
-
Said A., and Pearlman W.A. A new, fast, and efficient image codec based on set partitioning in hierarchical trees. IEEE Transactions on Circuit and Systems for Video Technology 6 3 (1996) 243-250
-
(1996)
IEEE Transactions on Circuit and Systems for Video Technology
, vol.6
, Issue.3
, pp. 243-250
-
-
Said, A.1
Pearlman, W.A.2
-
26
-
-
0345377853
-
Public-key image steganography using DCT and QPVQ coding
-
Chen W.-Y., and Chen C.-H. Public-key image steganography using DCT and QPVQ coding. Optical Engineering 42 10 (2003) 2886-2892
-
(2003)
Optical Engineering
, vol.42
, Issue.10
, pp. 2886-2892
-
-
Chen, W.-Y.1
Chen, C.-H.2
|