-
1
-
-
0031331952
-
Data encryption: a non-mathematical approach
-
Highland H.J. Data encryption: a non-mathematical approach. Comput. Secur. 16 (1997) 369-386
-
(1997)
Comput. Secur.
, vol.16
, pp. 369-386
-
-
Highland, H.J.1
-
3
-
-
42749087546
-
-
C.C. Chang, Y.C. Chou, T.D Kieu, High capacity data hiding for grayscale images, in: Proceedings of the First International Conference on Ubiquitous Information Management and Communication, Seoul, Korea, February 2007, pp. 139-148.
-
C.C. Chang, Y.C. Chou, T.D Kieu, High capacity data hiding for grayscale images, in: Proceedings of the First International Conference on Ubiquitous Information Management and Communication, Seoul, Korea, February 2007, pp. 139-148.
-
-
-
-
4
-
-
34247135365
-
Lossless data hiding in the spatial domain for high quality images
-
Jin H.L., Fujiyoshi M., and Kiya H. Lossless data hiding in the spatial domain for high quality images. IEICE Trans. Fundam. E90-A 4 (2007) 771-777
-
(2007)
IEICE Trans. Fundam.
, vol.E90-A
, Issue.4
, pp. 771-777
-
-
Jin, H.L.1
Fujiyoshi, M.2
Kiya, H.3
-
5
-
-
35048891531
-
-
A. Ker, Improved detection of LSB steganography in grayscale images, in: Proceedings of the Information Hiding Workshop, in: Lecture Notes in Computer Science, vol. 3200, Springer, Berlin, 2004, pp. 97-11.
-
A. Ker, Improved detection of LSB steganography in grayscale images, in: Proceedings of the Information Hiding Workshop, in: Lecture Notes in Computer Science, vol. 3200, Springer, Berlin, 2004, pp. 97-11.
-
-
-
-
6
-
-
0034483631
-
Cocktail watermarking for digital image protection
-
Lu C.S., Huang S.K., Sze C.J., and Liao H.Y.M. Cocktail watermarking for digital image protection. IEEE Trans. Multimedia 2 4 (2000) 209-224
-
(2000)
IEEE Trans. Multimedia
, vol.2
, Issue.4
, pp. 209-224
-
-
Lu, C.S.1
Huang, S.K.2
Sze, C.J.3
Liao, H.Y.M.4
-
7
-
-
13244269881
-
Lossless generalized-LSB data embedding
-
Celik M.U., Sharma G., Tekalp A.M., and Saber E. Lossless generalized-LSB data embedding. IEEE Trans. Image Process. 14 2 (2005) 253-266
-
(2005)
IEEE Trans. Image Process.
, vol.14
, Issue.2
, pp. 253-266
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
Saber, E.4
-
8
-
-
0036329257
-
Steganographic method for secure communications
-
Lou D.C., and Liu J.L. Steganographic method for secure communications. Comput. Secur. 21 5 (2002) 449-460
-
(2002)
Comput. Secur.
, vol.21
, Issue.5
, pp. 449-460
-
-
Lou, D.C.1
Liu, J.L.2
-
10
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
Wong P.W. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10 10 (2001) 1593-1601
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.W.1
-
11
-
-
1942486241
-
Wavelet tree quantization for copyright protection watermarking
-
Wang S.H., and Lin Y.P. Wavelet tree quantization for copyright protection watermarking. IEEE Trans. Image Process. 13 2 (2004) 154-165
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.2
, pp. 154-165
-
-
Wang, S.H.1
Lin, Y.P.2
-
12
-
-
25144448272
-
A hierarchical digital watermarking method for image tamper detection and recovery
-
Lin P.L., Hsieh C.K., and Huang P.W. A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 38 (2005) 2519-2529
-
(2005)
Pattern Recognition
, vol.38
, pp. 2519-2529
-
-
Lin, P.L.1
Hsieh, C.K.2
Huang, P.W.3
-
13
-
-
0036611838
-
Hierarchical watermarking for secure image authentication with localization
-
Celik M.U., Sharma G., Saber E., and Tekalp A.M. Hierarchical watermarking for secure image authentication with localization. IEEE Trans. Image Process. 11 (2002) 585-595
-
(2002)
IEEE Trans. Image Process.
, vol.11
, pp. 585-595
-
-
Celik, M.U.1
Sharma, G.2
Saber, E.3
Tekalp, A.M.4
-
14
-
-
33744903116
-
-
A. Harada, T. Isarida, T. Mizuno, M. Nishigaki, A user authentication system using schema of visual memory, in: Lecture Notes in Computer Science, vol. 3853, 2006, pp. 338-345.
-
A. Harada, T. Isarida, T. Mizuno, M. Nishigaki, A user authentication system using schema of visual memory, in: Lecture Notes in Computer Science, vol. 3853, 2006, pp. 338-345.
-
-
-
-
16
-
-
0035283377
-
Image hiding by optimal LSB substitution and genetic algorithm
-
Wang R.Z., Lin C.F., and Lin J.C. Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition 34 3 (2000) 671-683
-
(2000)
Pattern Recognition
, vol.34
, Issue.3
, pp. 671-683
-
-
Wang, R.Z.1
Lin, C.F.2
Lin, J.C.3
-
17
-
-
0035797467
-
Improved hiding data in images by optimal moderately significant-bit replacement
-
Chan C.K., and Cheng L.M. Improved hiding data in images by optimal moderately significant-bit replacement. Electron. Lett. 37 16 (2001) 1017-1018
-
(2001)
Electron. Lett.
, vol.37
, Issue.16
, pp. 1017-1018
-
-
Chan, C.K.1
Cheng, L.M.2
-
18
-
-
0037411306
-
Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy
-
Chang C.C., Hsiao J.Y., and Chan C.S. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition 36 7 (2003) 1583-1595
-
(2003)
Pattern Recognition
, vol.36
, Issue.7
, pp. 1583-1595
-
-
Chang, C.C.1
Hsiao, J.Y.2
Chan, C.S.3
-
19
-
-
0346216907
-
Hiding data in images by simple LSB substitution
-
Chan C.K., and Chen L.M. Hiding data in images by simple LSB substitution. Pattern Recognition 37 3 (2004) 469-474
-
(2004)
Pattern Recognition
, vol.37
, Issue.3
, pp. 469-474
-
-
Chan, C.K.1
Chen, L.M.2
-
20
-
-
4544351078
-
A steganographic method for digital images using side match
-
Chang C.C., and W Tseng H. A steganographic method for digital images using side match. Pattern Recognition Lett. 25 12 (2004) 1431-1437
-
(2004)
Pattern Recognition Lett.
, vol.25
, Issue.12
, pp. 1431-1437
-
-
Chang, C.C.1
W Tseng, H.2
-
21
-
-
84993973063
-
Weighted bipartite graph for locating optimal LSB substitution for secret embedding
-
Yang C.H., and Wang S.J. Weighted bipartite graph for locating optimal LSB substitution for secret embedding. J. Discrete Math. Sci. Cryptography 9 1 (2006) 153-164
-
(2006)
J. Discrete Math. Sci. Cryptography
, vol.9
, Issue.1
, pp. 153-164
-
-
Yang, C.H.1
Wang, S.J.2
-
22
-
-
33747782523
-
New image steganographic methods using run-length approach
-
Chang C.C., Lin C.Y., and Wang Y.Z. New image steganographic methods using run-length approach. Inf. Sci. 176 (2006) 3393-3408
-
(2006)
Inf. Sci.
, vol.176
, pp. 3393-3408
-
-
Chang, C.C.1
Lin, C.Y.2
Wang, Y.Z.3
-
23
-
-
0037410595
-
A steganographic method for images by pixel-value differencing
-
Wu D.C., and Tsai W.H. A steganographic method for images by pixel-value differencing. Pattern Recognition Lett. 24 9-10 (2003) 1613-1626
-
(2003)
Pattern Recognition Lett.
, vol.24
, Issue.9-10
, pp. 1613-1626
-
-
Wu, D.C.1
Tsai, W.H.2
-
24
-
-
27144475598
-
Image steganographic scheme based on pixel-value differencing and LSB replacement methods
-
Wu H.C., Wu N.I., Tsai C.S., and Hwang M.S. Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proc. Vision Image Signal Process. 152 5 (2005) 611-615
-
(2005)
IEE Proc. Vision Image Signal Process.
, vol.152
, Issue.5
, pp. 611-615
-
-
Wu, H.C.1
Wu, N.I.2
Tsai, C.S.3
Hwang, M.S.4
-
25
-
-
42749087313
-
-
C.H. Yang, Chi-Yao Weng, A steganographic method for digital images by multi-pixel differencing, in: International Computer Symposium, Taipei, Taiwan, December 2006, pp. 831-836.
-
C.H. Yang, Chi-Yao Weng, A steganographic method for digital images by multi-pixel differencing, in: International Computer Symposium, Taipei, Taiwan, December 2006, pp. 831-836.
-
-
-
-
26
-
-
35848929919
-
A high quality steganography method with pixel-value differencing and modulus function
-
Wang C.M., Wu N.I., Tsai C.S., and Hwang M.S. A high quality steganography method with pixel-value differencing and modulus function. J. Syst. Software 81 1 (2008) 150-158
-
(2008)
J. Syst. Software
, vol.81
, Issue.1
, pp. 150-158
-
-
Wang, C.M.1
Wu, N.I.2
Tsai, C.S.3
Hwang, M.S.4
-
27
-
-
0142057129
-
A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
-
Thien C.C., and Lin J.C. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition 36 11 (2003) 2875-2881
-
(2003)
Pattern Recognition
, vol.36
, Issue.11
, pp. 2875-2881
-
-
Thien, C.C.1
Lin, J.C.2
-
28
-
-
14844354093
-
Steganography of capacity required using modulo operator for embedding secret image
-
Wang S.J. Steganography of capacity required using modulo operator for embedding secret image. Appl. Math. Comput. 164 (2005) 99-116
-
(2005)
Appl. Math. Comput.
, vol.164
, pp. 99-116
-
-
Wang, S.J.1
|