-
1
-
-
0036497685
-
A Steganographic Method Based upon JPEG and Quantization Table Modification
-
C. C. Chang, T. S. Chen and L. Z. Chung: A Steganographic Method Based upon JPEG and Quantization Table Modification, Information Sciences, 141 (2002) 123-138.
-
(2002)
Information Sciences
, vol.141
, pp. 123-138
-
-
Chang, C.C.1
Chen, T.S.2
Chung, L.Z.3
-
3
-
-
34249085398
-
Image Data Compression: Block Truncation Coding
-
Los Alamitos, CA
-
B. V. Dasarathy: Image Data Compression: Block Truncation Coding, IEEE Computer Society Press, Los Alamitos, CA, 1995.
-
(1995)
IEEE Computer Society Press
-
-
Dasarathy, B.V.1
-
4
-
-
0346373093
-
Computer Graphics
-
2nd Edition, Addison-Wesley, Reading, MA
-
J. D. Foley, A. V. Dam, S. K. Feiner and J. F. Hughes: Computer Graphics, Principle, and Practice, 2nd Edition, Addison-Wesley, Reading, MA, 1990.
-
(1990)
Principle, and Practice
-
-
Foley, J.D.1
Dam, A.V.2
Feiner, S.K.3
Hughes, J.F.4
-
5
-
-
1542363250
-
A New Steganographic Method for Palette-Based Images
-
Savannah, Georgia
-
J. Fridrich: A New Steganographic Method for Palette-Based Images, Proceedings of the IS&T PICS Conference, Savannah, Georgia, 1998, pp. 285-289.
-
(1998)
Proceedings of the IS&T PICS Conference
, pp. 285-289
-
-
Fridrich, J.1
-
7
-
-
34249033445
-
-
H. Kobayashi, Y. Noguchi and H. Kiya: A Method of Embedding Binary Data into JPEG Bitstreams, IEICE Transactions on Fundamentals, J83-D2 (6) (2000) 1469-1476.
-
H. Kobayashi, Y. Noguchi and H. Kiya: A Method of Embedding Binary Data into JPEG Bitstreams, IEICE Transactions on Fundamentals, J83-D2 (6) (2000) 1469-1476.
-
-
-
-
8
-
-
0037233509
-
Visual Cryptography for Gray-Level Images by Dithering Techniques
-
C. C. Lin and W. H. Tsai: Visual Cryptography for Gray-Level Images by Dithering Techniques, Pattern Recognition Letters, 24 (2003) 349-358.
-
(2003)
Pattern Recognition Letters
, vol.24
, pp. 349-358
-
-
Lin, C.C.1
Tsai, W.H.2
-
9
-
-
4444342040
-
Secret Image Sharing with Steganography and Authentication
-
C. C. Lin and W. H. Tsai: Secret Image Sharing with Steganography and Authentication, The Journal of Systems and Software, 73 (2004) 405-414.
-
(2004)
The Journal of Systems and Software
, vol.73
, pp. 405-414
-
-
Lin, C.C.1
Tsai, W.H.2
-
10
-
-
84926193517
-
Visual Cryptography
-
Proceedings of Advances in Cryptography-EUROCRYPT'94, Berlin, Springer-Verlag
-
M. Naor and A. Shamir: Visual Cryptography, Proceedings of Advances in Cryptography-EUROCRYPT'94, Berlin, Springer-Verlag LNCS, 1995, pp. 1-12.
-
(1995)
LNCS
, pp. 1-12
-
-
Naor, M.1
Shamir, A.2
-
12
-
-
0036794537
-
Secret Image Sharing
-
C. C. Thien and J. C. Lin: Secret Image Sharing, Computers & Graphics, 26 (5) (2002) 765-770.
-
(2002)
Computers & Graphics
, vol.26
, Issue.5
, pp. 765-770
-
-
Thien, C.C.1
Lin, J.C.2
-
13
-
-
0842283612
-
An Image Hiding Technique Using Block Truncation Coding
-
Kitakyushu, Japan
-
P. Tsai, Y. C. Hu and C. C. Chang: An Image Hiding Technique Using Block Truncation Coding, Proceedings of Pacific Rim Workshop on Digital Steganography, Kitakyushu, Japan, 2002, pp. 54-64.
-
(2002)
Proceedings of Pacific Rim Workshop on Digital Steganography
, pp. 54-64
-
-
Tsai, P.1
Hu, Y.C.2
Chang, C.C.3
-
15
-
-
0035283377
-
Image Hiding by Optimal LSB Substitution and Genetic Algorithm
-
R. Z. Wang, C. F. Lin and J. C. Lin: Image Hiding by Optimal LSB Substitution and Genetic Algorithm, Pattern Recognition, 34 (3) (2001) 671-683.
-
(2001)
Pattern Recognition
, vol.34
, Issue.3
, pp. 671-683
-
-
Wang, R.Z.1
Lin, C.F.2
Lin, J.C.3
-
16
-
-
2442604250
-
Sharing and Hiding Secret Images with Size Constraint
-
Y.-S. Wu, C.-C. Thien and J.-C. Lin: Sharing and Hiding Secret Images with Size Constraint, Pattern Recognition, 37 (7) (2004) 1377-1385.
-
(2004)
Pattern Recognition
, vol.37
, Issue.7
, pp. 1377-1385
-
-
Wu, Y.-S.1
Thien, C.-C.2
Lin, J.-C.3
|