-
1
-
-
0346216907
-
Hiding data in images by simple LSB substitution
-
Chan C.K., and Cheng L.M. Hiding data in images by simple LSB substitution. Pattern Recognition 37 March (2004) 469-474
-
(2004)
Pattern Recognition
, vol.37
, Issue.March
, pp. 469-474
-
-
Chan, C.K.1
Cheng, L.M.2
-
2
-
-
4544351078
-
A steganographic method for digital images using side match
-
Chang C.C., and Tseng H.W. A steganographic method for digital images using side match. Pattern Recognition Letter 25 September (2004) 1431-1437
-
(2004)
Pattern Recognition Letter
, vol.25
, Issue.September
, pp. 1431-1437
-
-
Chang, C.C.1
Tseng, H.W.2
-
3
-
-
0037411306
-
Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy
-
Chang C.C., Hsiao J.Y., and Chan C.S. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition 36 July (2003) 1583-1595
-
(2003)
Pattern Recognition
, vol.36
, Issue.July
, pp. 1583-1595
-
-
Chang, C.C.1
Hsiao, J.Y.2
Chan, C.S.3
-
4
-
-
33845467262
-
Reversible watermarking: current status and key issues
-
Feng J.B., Lin I.C., Tsai C.S., and Chu Y.P. Reversible watermarking: current status and key issues. International Journal of Network Security 2 May (2006) 161-170
-
(2006)
International Journal of Network Security
, vol.2
, Issue.May
, pp. 161-170
-
-
Feng, J.B.1
Lin, I.C.2
Tsai, C.S.3
Chu, Y.P.4
-
5
-
-
0034787093
-
-
Fridrich, J., Goljan, M., Du, R., 2001. Reliable detection of LSB steganography in color and grayscale images. In: Proceedings of ACM Workshop on Multimedia and Security, pp. 27-30.
-
-
-
-
6
-
-
8844280060
-
-
Ker, A.D., 2004. Quantitative evaluation of pairs and RS steganalysis. In: Proceedings of the SPIE Security, Steganography, and Watermarking of Multimedia Contents, vol. 5306, pp. 83-97.
-
-
-
-
8
-
-
4444342040
-
Secret image sharing with steganography and authentication
-
Lin C.C., and Tsai W.H. Secret image sharing with steganography and authentication. The Journal of Systems and Software 73 November (2004) 405-414
-
(2004)
The Journal of Systems and Software
, vol.73
, Issue.November
, pp. 405-414
-
-
Lin, C.C.1
Tsai, W.H.2
-
9
-
-
0036329257
-
Steganographic method for secure communications
-
Lou D.C., and Liu J.L. Steganographic method for secure communications. Computers and Security 21 October (2002) 449-460
-
(2002)
Computers and Security
, vol.21
, Issue.October
, pp. 449-460
-
-
Lou, D.C.1
Liu, J.L.2
-
10
-
-
0032680807
-
-
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G., 1999. Information hiding - a survey. In: Proceedings of the IEEE Special Issue on Identification and Protection of Multimedia Content, vol. 87, pp. 1062-1078.
-
-
-
-
11
-
-
35848956586
-
-
Simmons, G.J., 1984. The prisoners' problem and the subliminal channel. In: Proceedings of Crypto'83, pp. 51-67.
-
-
-
-
12
-
-
0142057129
-
A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
-
Thien C.C., and Lin J.C. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition 36 December (2003) 2875-2881
-
(2003)
Pattern Recognition
, vol.36
, Issue.December
, pp. 2875-2881
-
-
Thien, C.C.1
Lin, J.C.2
-
15
-
-
14844354093
-
Steganography of capacity required using modulo operator for embedding secret image
-
Wang S.J. Steganography of capacity required using modulo operator for embedding secret image. Applied Mathematics and Computation 164 May (2005) 99-116
-
(2005)
Applied Mathematics and Computation
, vol.164
, Issue.May
, pp. 99-116
-
-
Wang, S.J.1
-
16
-
-
33644784854
-
Steganography on point-sampled geometry
-
Wang C.M., and Wang P.C. Steganography on point-sampled geometry. Computers and Graphics 12 April (2006) 244-254
-
(2006)
Computers and Graphics
, vol.12
, Issue.April
, pp. 244-254
-
-
Wang, C.M.1
Wang, P.C.2
-
17
-
-
0035283377
-
Image hiding by optimal LSB substitution and genetic algorithm
-
Wang R.Z., Lin C.F., and Lin J.C. Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition 34 March (2001) 671-683
-
(2001)
Pattern Recognition
, vol.34
, Issue.March
, pp. 671-683
-
-
Wang, R.Z.1
Lin, C.F.2
Lin, J.C.3
-
19
-
-
3242759877
-
Data hiding in binary image for authentication and annotation
-
Wu M., and Liu B. Data hiding in binary image for authentication and annotation. IEEE Transactions on Multimedia 6 August (2004) 528-538
-
(2004)
IEEE Transactions on Multimedia
, vol.6
, Issue.August
, pp. 528-538
-
-
Wu, M.1
Liu, B.2
-
20
-
-
0037410595
-
A steganographic method for images by pixel-value differencing
-
Wu D.C., and Tsai W.H. A steganographic method for images by pixel-value differencing. Pattern Recognition Letters 24 June (2003) 1613-1626
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.June
, pp. 1613-1626
-
-
Wu, D.C.1
Tsai, W.H.2
-
21
-
-
27144475598
-
Image steganographic scheme based on pixel-value differencing and LSB replacement methods
-
Wu H.C., Wu N.I., Tsai C.S., and Hwang M.S. Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proceedings - Vision Image and Signal Processing 152 October (2005) 611-615
-
(2005)
IEE Proceedings - Vision Image and Signal Processing
, vol.152
, Issue.October
, pp. 611-615
-
-
Wu, H.C.1
Wu, N.I.2
Tsai, C.S.3
Hwang, M.S.4
|