메뉴 건너뛰기




Volumn 2, Issue , 2006, Pages 10050-10053

A robust image hiding method based on sign embedding and fuzzy classification

Author keywords

Discrete cosine transform (DCT); Fuzzy classification; Human visual system (HVS); Image hiding; Steganography

Indexed keywords

CLASSIFICATION (OF INFORMATION); DISCRETE COSINE TRANSFORMS; ERROR ANALYSIS; FEATURE EXTRACTION; FUZZY CONTROL; ROBUSTNESS (CONTROL SYSTEMS);

EID: 34047234908     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WCICA.2006.1713965     Document Type: Conference Paper
Times cited : (6)

References (10)
  • 1
    • 2442604250 scopus 로고    scopus 로고
    • Sharing and hiding secret images with size constraint
    • Yu-Shan Wu, Chih-Ching Thien, Ja-Chen Lin, Sharing and hiding secret images with size constraint, Pattern Recognition 37 (2004) 1377-1385.
    • (2004) Pattern Recognition , vol.37 , pp. 1377-1385
    • Wu, Y.1    Thien, C.2    Lin, J.3
  • 2
    • 0041821327 scopus 로고    scopus 로고
    • A new approach to reliable detection of LSB steganography in natural images
    • Tao Zhang and Xijian Ping, "A new approach to reliable detection of LSB steganography in natural images," Signal Processing 83, 2003, pp. 20852093.
    • (2003) Signal Processing , vol.83 , pp. 20852093
    • Zhang, T.1    Ping, X.2
  • 3
    • 0348108146 scopus 로고    scopus 로고
    • Lossless compression and information hiding in images
    • S. S. Maniccam and N. Bourbakis, "Lossless compression and information hiding in images, " Pattern Recognition 37, 2004, pp. 475-486.
    • (2004) Pattern Recognition , vol.37 , pp. 475-486
    • Maniccam, S.S.1    Bourbakis, N.2
  • 4
    • 0037411306 scopus 로고    scopus 로고
    • Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy
    • Chin-Chen Chang, et al, "Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy," Pattern Recognition 36, 2003, pp. 1583-1595.
    • (2003) Pattern Recognition , vol.36 , pp. 1583-1595
    • Chang, C.1
  • 5
    • 0038359463 scopus 로고    scopus 로고
    • Rajendra Acharya U, et al, Transmission and storage of medical images with patient information, Computers in Biology and Medicine 33, 2003,pp.303-310. M. Young, The Technical Writer's Handbook, Mill Valley, CA: University Science, 1989.
    • Rajendra Acharya U, et al, "Transmission and storage of medical images with patient information," Computers in Biology and Medicine 33, 2003,pp.303-310. M. Young, The Technical Writer's Handbook, Mill Valley, CA: University Science, 1989.
  • 6
    • 4544351078 scopus 로고    scopus 로고
    • A stegonographic method for digital images using side match
    • Chin-Chen Chang and Hsien-Wen Tseng, "A stegonographic method for digital images using side match," Pattern Recognition Letters 25, 2004,pp.1431-1437.
    • (2004) Pattern Recognition Letters , vol.25 , pp. 1431-1437
    • Chang, C.1    Tseng, H.2
  • 7
    • 0346216907 scopus 로고    scopus 로고
    • Hiding data in images by simple LSB substitution
    • Chi Kwong Chan and L.M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition 37, 2004,pp.469-474.
    • (2004) Pattern Recognition , vol.37 , pp. 469-474
    • Kwong Chan, C.1    Cheng, L.M.2
  • 8
    • 0346216907 scopus 로고    scopus 로고
    • Hiding data in images by simple LSB substitution
    • Chi Kwong Chan and L.M. Cheng, "Hiding data in images by simple LSB substitution, " Pattern Recognition 37, 2004, pp.469-474.
    • (2004) Pattern Recognition , vol.37 , pp. 469-474
    • Kwong Chan, C.1    Cheng, L.M.2
  • 9
    • 34047235441 scopus 로고    scopus 로고
    • Comparative study of some image data hiding methods
    • Jin Cong and Peng Jia-Xiong, "Comparative study of some image data hiding methods, " in Signal Processing 20 (2), 2004,pp.127-132.
    • (2004) Signal Processing , vol.20 , Issue.2 , pp. 127-132
    • Cong, J.1    Jia-Xiong, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.