-
1
-
-
0346216907
-
Hiding data in images by simple LSB substitution
-
Mar
-
C. K. Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition, pp. 469-474, Mar. 2004.
-
(2004)
Pattern Recognition
, pp. 469-474
-
-
Chan, C.K.1
Cheng, L.M.2
-
2
-
-
0036497685
-
A steganographic method based upon JPEG and quantization table modification
-
Mar
-
C. C. Chang, T. S. Chen, and L. Z. Chung, "A steganographic method based upon JPEG and quantization table modification," Information Sciences, vol. 141, pp. 123-138, Mar. 2002.
-
(2002)
Information Sciences
, vol.141
, pp. 123-138
-
-
Chang, C.C.1
Chen, T.S.2
Chung, L.Z.3
-
3
-
-
0037411306
-
Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy
-
C. C. Chang, J. Y. Hsiao, and C. S. Chan, "Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy," Pattern Recognition, vol. 36, no. 7, pp. 1583-1595, 2003.
-
(2003)
Pattern Recognition
, vol.36
, Issue.7
, pp. 1583-1595
-
-
Chang, C.C.1
Hsiao, J.Y.2
Chan, C.S.3
-
4
-
-
4544351078
-
A steganographic method for digital images using side match
-
C. C. Chang and H. W. Tseng, "A steganographic method for digital images using side match," Pattern Recognition Letter, no. 25, pp. 1431-1437, 2004.
-
(2004)
Pattern Recognition Letter
, Issue.25
, pp. 1431-1437
-
-
Chang, C.C.1
Tseng, H.W.2
-
5
-
-
27844504298
-
A new framework of lsb steganalysis of digital media
-
Oct
-
S. Dumitrescu and X. Wu, "A new framework of lsb steganalysis of digital media," IEEE Transactions on Signal Process, vol. 53, pp. 3923-3935, Oct. 2005.
-
(2005)
IEEE Transactions on Signal Process
, vol.53
, pp. 3923-3935
-
-
Dumitrescu, S.1
Wu, X.2
-
6
-
-
0037524382
-
Detection of lsb steganography via sample pair analysis
-
Jul
-
S. Dumitrescu, X. Wu, and Z. Wang, "Detection of lsb steganography via sample pair analysis," IEEE Transactions on Signal Process, vol. 51, pp. 1995-2007, Jul. 2003.
-
(2003)
IEEE Transactions on Signal Process
, vol.51
-
-
Dumitrescu, S.1
Wu, X.2
Wang, Z.3
-
7
-
-
0034787093
-
Reliable detection of lsb steganography in grayscale and color images
-
J. Fridrich, M. Goljan, and R. Du, "Reliable detection of lsb steganography in grayscale and color images," in Proceedings of ACM Workshop on Multimedia and Security, pp. 27-30, 2001.
-
(2001)
in Proceedings of ACM Workshop on Multimedia and Security
, pp. 27-30
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
8
-
-
2342464968
-
Digital steganography utilizing features of JPEG images
-
Apr
-
M. IWATA, K. MIYAKE, and A. SHIOZAKI, "Digital steganography utilizing features of JPEG images," IEICE Transactions on Fundamentals, vol. E87-A, pp. 929-936, Apr. 2004.
-
(2004)
IEICE Transactions on Fundamentals
, vol.E87
, Issue.A
, pp. 929-936
-
-
Iwata, M.1
Miyake, K.2
Shiozaki, A.3
-
9
-
-
20444404178
-
Steganalysis of lsb matching in grayscale images
-
June
-
A. D. Ker, "Steganalysis of lsb matching in grayscale images," IEEE Signal Processing Letters, vol. 12, pp. 441-444, June 2005.
-
(2005)
IEEE Signal Processing Letters
, vol.12
, pp. 441-444
-
-
Ker, A.D.1
-
10
-
-
4444342040
-
Secret image sharing with steganography and authentication
-
Nov
-
C. C. Lin andW. H. Tsai, "Secret image sharing with steganography and authentication," Journal of Systems and Software, vol. 73, pp. 405-414, Nov. 2004.
-
(2004)
Journal of Systems and Software
, vol.73
, pp. 405-414
-
-
Lin, C.C.1
Tsai, W.H.2
-
11
-
-
0036329257
-
Steganographic method for secure communications
-
June
-
D. C. Lou and J. L. Liu, "Steganographic method for secure communications," Computers and Security, vol. 21, pp. 449-460, June 2002.
-
(2002)
Computers and Security
, vol.21
, pp. 449-460
-
-
Lou, D.C.1
Liu, J.L.2
-
12
-
-
0032682054
-
Spread spectrum image steganography
-
Aug
-
L. M. Marvel, C. G. Boncelet, and C. T. Retter, "Spread spectrum image steganography," IEEE Transactions on Image Processing, vol. 8, pp. 1075-1083, Aug. 1999.
-
(1999)
IEEE Transactions on Image Processing
, vol.8
-
-
Marvel, L.M.1
Boncelet, C.G.2
Retter, C.T.3
-
13
-
-
14544299158
-
A new blind method for detecting novel steganography
-
B. T. Mcbride, G. L. Peterson, and S. C. Gustafson, "A new blind method for detecting novel steganography," Digital Investigation, vol. 2, pp. 50-70, 2005.
-
(2005)
Digital Investigation
, vol.2
, pp. 50-70
-
-
Mcbride, B.T.1
Peterson, G.L.2
Gustafson, S.C.3
-
14
-
-
18844400288
-
A foundation for watermarking in compressed domain
-
May
-
B. G. Mobasseri and R. J. Berger, "A foundation for watermarking in compressed domain," IEEE Signal Processing Letters, vol. 12, pp. 399-402, May 2005.
-
(2005)
IEEE Signal Processing Letters
, vol.12
, pp. 399-402
-
-
Mobasseri, B.G.1
Berger, R.J.2
-
15
-
-
0001217738
-
The prisoners' problem and the subliminal channel
-
G. J. Simmons, "The prisoners' problem and the subliminal channel," in Proceedings of Crypto'83, pp. 51-67, 1984.
-
(1984)
in Proceedings of Crypto'83
, pp. 51-67
-
-
Simmons, G.J.1
-
16
-
-
0142057129
-
A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
-
C. C. Thien and J. C. Lin, "A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function," Pattern Recognition, vol. 36, no. 12, pp. 2875-2881, 2003.
-
(2003)
Pattern Recognition, vol. 36, no. 12
, pp. 2875-2881
-
-
Thien, C.C.1
Lin, J.C.2
-
17
-
-
2442555374
-
High capacity data hiding in jpeg-compressed images
-
H. W. Tseng and C. C. Chnag, "High capacity data hiding in jpeg-compressed images," Informatica, vol. 15, no. 1, pp. 127-142, 2004.
-
(2004)
Informatica
, vol.15
, Issue.1
, pp. 127-142
-
-
Tseng, H.W.1
Chnag, C.C.2
-
18
-
-
0036688310
-
A secure data hiding scheme for binary images
-
Aug
-
Y. C. Tseng, Y. Y. Chen, and H. K. Pan, "A secure data hiding scheme for binary images," IEEE Transactions on Communications, vol. 50, pp. 1227-1231, Aug. 2002.
-
(2002)
IEEE Transactions on Communications, vol. 50
, pp. 1227-1231
-
-
Tseng, Y.C.1
Chen, Y.Y.2
Pan, H.K.3
-
20
-
-
0141953943
-
A new approach to authentication of binary image for multimedia communication with distortion reduction and security enhancement
-
Sept
-
C. H. Tzeng andW. H. Tsai, "A new approach to authentication of binary image for multimedia communication with distortion reduction and security enhancement," IEEE Communications Letters, vol. 7, pp. 443-445, Sept. 2003.
-
(2003)
IEEE Communications Letters
, vol.7
, pp. 443-445
-
-
Tzeng, C.H.1
Tsai, W.H.2
-
21
-
-
3042638288
-
A combined approach to integrity protection and verification of palette images using fragile watermarks and digital signatures
-
June
-
C. H. Tzeng and W. H. Tsai, "A combined approach to integrity protection and verification of palette images using fragile watermarks and digital signatures," IEICE Transactions on Fundamentals, vol. E87-A, pp. 1612-1619, June 2004.
-
(2004)
IEICE Transactions on Fundamentals, vol. E87-A
, pp. 1612-1619
-
-
Tzeng, C.H.1
Tsai, W.H.2
-
22
-
-
2942519383
-
Adaptive data hiding in palette images by color ordering and mapping with security protection
-
May
-
C. H. Tzeng, Z. F. Yang, and W. H. Tsai, "Adaptive data hiding in palette images by color ordering and mapping with security protection," IEEE Transactions on Communications, vol. 52, pp. 791-800, May 2004.
-
(2004)
IEEE Transactions on Communications, vol. 52
, pp. 791-800
-
-
Tzeng, C.H.1
Yang, Z.F.2
Tsai, W.H.3
-
23
-
-
0035283377
-
Image hiding by optimal lsb substitution and genetic algorithm
-
R. Z. Wang, C. F. Lin, and J. C. Lin, "Image hiding by optimal lsb substitution and genetic algorithm," Pattern Recognition, vol. 34, no. 3, pp. 671-683, 2001.
-
(2001)
Pattern Recognition
, vol.34
, Issue.3
, pp. 671-683
-
-
Wang, R.Z.1
Lin, C.F.2
Lin, J.C.3
-
24
-
-
14844354093
-
Steganography of capacity required using modulo operator for embedding secret image
-
Jan
-
S. J. Wang, "Steganography of capacity required using modulo operator for embedding secret image," Applied Mathematics and Computation, vol. 164, pp. 99-116, Jan. 2005.
-
(2005)
Applied Mathematics and Computation
, vol.164
, pp. 99-116
-
-
Wang, S.J.1
-
25
-
-
0037410595
-
A steganographic method for images by pixel-value differencing
-
D. C. Wu and W. H. Tsai, "A steganographic method for images by pixel-value differencing," Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1613- 1626, 2003.
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.9-10
, pp. 16131626
-
-
Wu, D.C.1
Tsai, W.H.2
-
26
-
-
27144475598
-
Image steganographic scheme based on pixel-value differencing and LSB replacement methods
-
Oct
-
H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, "Image steganographic scheme based on pixel-value differencing and LSB replacement methods," IEE Proceedings of Visual Image Signal Process, vol. 152, pp. 611-615, Oct. 2005.
-
(2005)
IEE Proceedings of Visual Image Signal Process
, vol.152
, pp. 611-615
-
-
Wu, H.C.1
Wu, N.I.2
Tsai, C.S.3
Hwang, M.S.4
-
27
-
-
0347355321
-
An iterative method of palette-based image steganography
-
M. Y. Wu, Y. K. Ho, and J. H. Lee, "An iterative method of palette-based image steganography," Pattern Recognition Letters, vol. 25, pp. 301-309, 2004.
-
(2004)
Pattern Recognition Letters
, vol.25
, pp. 301-309
-
-
Wu, M.Y.1
Ho, Y.K.2
Lee, J.H.3
-
28
-
-
3242759877
-
Data hiding in binary image for authentication and annotation
-
Aug
-
Min Wu and Bede Liu, "Data hiding in binary image for authentication and annotation," IEEE Transactions on Multimedia, vol. 6, pp. 528-538, Aug. 2004.
-
(2004)
IEEE Transactions on Multimedia, vol. 6
, pp. 528-538
-
-
Wu, M.1
Liu, B.2
-
29
-
-
13644262818
-
Hiding secret data in images via predictive coding
-
May
-
Y. H. Yu, C. C. Chang, and Y. C. Hu, "Hiding secret data in images via predictive coding," Pattern Recognition, vol. 38, pp. 691-705, May 2005.
-
(2005)
Pattern Recognition
, vol.38
, pp. 691-705
-
-
Yu, Y.H.1
Chang, C.C.2
Hu, Y.C.3
-
30
-
-
11844253853
-
Steganography using multiple-base notational system and human vision sensitivity
-
Jan
-
X. Zhang and S. Wang, "Steganography using multiple-base notational system and human vision sensitivity," IEEE Signal Processing Letters, vol. 12, pp. 67-70, Jan. 2005.
-
(2005)
IEEE Signal Processing Letters
, vol.12
, pp. 67-70
-
-
Zhang, X.1
Wang, S.2
|