-
2
-
-
33644985948
-
Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels
-
Chang C.-C., Chan C.-S., and Fan Y.-H. Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Pattern Recognition 39 6 (2006) 1155-1167
-
(2006)
Pattern Recognition
, vol.39
, Issue.6
, pp. 1155-1167
-
-
Chang, C.-C.1
Chan, C.-S.2
Fan, Y.-H.3
-
3
-
-
33644969019
-
A novel image-hiding scheme based on block difference
-
Chan
-
Li S.-L., Leung K.-C., Cheng L.M., -K C., and Chan. A novel image-hiding scheme based on block difference. Pattern Recognition 39 6 (2006) 1168-1176
-
(2006)
Pattern Recognition
, vol.39
, Issue.6
, pp. 1168-1176
-
-
Li, S.-L.1
Leung, K.-C.2
Cheng, L.M.3
-K, C.4
-
4
-
-
32644446054
-
High-performance JPEG steganography using quantization index modulation in DCT domain
-
Noda H., Niimi M., and Kawaguchi E. High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recognition Lett. 27 5 (2006) 455-461
-
(2006)
Pattern Recognition Lett.
, vol.27
, Issue.5
, pp. 455-461
-
-
Noda, H.1
Niimi, M.2
Kawaguchi, E.3
-
5
-
-
13644262818
-
Hiding secret data in images via predictive coding
-
Yu Y.-H., Chang C.-C., and Hu Y.-C. Hiding secret data in images via predictive coding. Pattern Recognition 38 5 (2005) 691-705
-
(2005)
Pattern Recognition
, vol.38
, Issue.5
, pp. 691-705
-
-
Yu, Y.-H.1
Chang, C.-C.2
Hu, Y.-C.3
-
6
-
-
4544351078
-
A steganographic method for digital images using side match
-
Chang C.-C., and Tseng H.-W. A steganographic method for digital images using side match. Pattern Recognition 25 12 (2004) 1431-1437
-
(2004)
Pattern Recognition
, vol.25
, Issue.12
, pp. 1431-1437
-
-
Chang, C.-C.1
Tseng, H.-W.2
-
7
-
-
0347355321
-
An iterative method of palette-based image steganography
-
Wu M.-Y., Ho Y.-K., and Lee J.-H. An iterative method of palette-based image steganography. Pattern Recognition Lett. 25 3 (2004) 301-309
-
(2004)
Pattern Recognition Lett.
, vol.25
, Issue.3
, pp. 301-309
-
-
Wu, M.-Y.1
Ho, Y.-K.2
Lee, J.-H.3
-
8
-
-
0346216907
-
Hiding data in images by simple LSB substitution
-
Chan C.-K., and Cheng L.M. Hiding data in images by simple LSB substitution. Pattern Recognition 37 3 (2004) 469-474
-
(2004)
Pattern Recognition
, vol.37
, Issue.3
, pp. 469-474
-
-
Chan, C.-K.1
Cheng, L.M.2
-
9
-
-
0142057129
-
A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
-
Thien C.-C., and Lin J.-C. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition 36 12 (2003) 2875-2881
-
(2003)
Pattern Recognition
, vol.36
, Issue.12
, pp. 2875-2881
-
-
Thien, C.-C.1
Lin, J.-C.2
-
10
-
-
0037410595
-
A steganographic method for images by pixel-value differencing
-
Wu D.-C., and Tsai W.-H. A steganographic method for images by pixel-value differencing. Pattern Recognition Lett. 24 9-10 (2003) 1613-1626
-
(2003)
Pattern Recognition Lett.
, vol.24
, Issue.9-10
, pp. 1613-1626
-
-
Wu, D.-C.1
Tsai, W.-H.2
-
11
-
-
0036329257
-
Steganographic method for secure communications
-
Lou D.-C., and Liu J.-L. Steganographic method for secure communications. Comput. Secur. 21 5 (2002) 449-460
-
(2002)
Comput. Secur.
, vol.21
, Issue.5
, pp. 449-460
-
-
Lou, D.-C.1
Liu, J.-L.2
-
12
-
-
0036833013
-
BPCS steganography using EZW lossy compressed images
-
Spaulding J., Noda H., Shirazi M.N., and Kawaguchi E. BPCS steganography using EZW lossy compressed images. Pattern Recognition Lett. 23 13 (2002) 1579-1587
-
(2002)
Pattern Recognition Lett.
, vol.23
, Issue.13
, pp. 1579-1587
-
-
Spaulding, J.1
Noda, H.2
Shirazi, M.N.3
Kawaguchi, E.4
-
13
-
-
0036029074
-
-
J.J. Eggers, R. Bauml, B. Girod, A communications approach to image steganography, in: Proceedings of SPIE: Security and Watermarking of Multimedia Contents, vol. 4675, 2002, pp. 26-37.
-
J.J. Eggers, R. Bauml, B. Girod, A communications approach to image steganography, in: Proceedings of SPIE: Security and Watermarking of Multimedia Contents, vol. 4675, 2002, pp. 26-37.
-
-
-
-
14
-
-
0036497685
-
A steganographic method based upon JPEG and quantization table modification
-
Chang C.-C., Chen T.-S., and Chung L.-Z. A steganographic method based upon JPEG and quantization table modification. Inf. Sci. 141 1-2 (2002) 123-138
-
(2002)
Inf. Sci.
, vol.141
, Issue.1-2
, pp. 123-138
-
-
Chang, C.-C.1
Chen, T.-S.2
Chung, L.-Z.3
-
15
-
-
0035283377
-
Image hiding by optimal LSB substitution and genetic algorithm
-
Wang R.-Z., Lin C.-F., and Lin J.-C. Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition 34 3 (2001) 671-683
-
(2001)
Pattern Recognition
, vol.34
, Issue.3
, pp. 671-683
-
-
Wang, R.-Z.1
Lin, C.-F.2
Lin, J.-C.3
-
16
-
-
84937814312
-
-
A. Westfeld, High capacity despite better steganalysis (F5-a steganographic algorithm), in: Proceedings of the Fourth International Workshop on Information Hiding, vol. 2137, 2001, pp. 289-302.
-
A. Westfeld, High capacity despite better steganalysis (F5-a steganographic algorithm), in: Proceedings of the Fourth International Workshop on Information Hiding, vol. 2137, 2001, pp. 289-302.
-
-
-
-
17
-
-
85084160704
-
-
N. Provos, Defending against statistical steganalysis, in: Proceedings of the 10th USENIX Security Symposium, 2001, pp. 323-336.
-
N. Provos, Defending against statistical steganalysis, in: Proceedings of the 10th USENIX Security Symposium, 2001, pp. 323-336.
-
-
-
-
18
-
-
44649190118
-
-
J-Steg 〈http://www.ussrback.com/crypto/steanography/DOS/jsteg.txt〉.
-
J-Steg 〈http://www.ussrback.com/crypto/steanography/DOS/jsteg.txt〉.
-
-
-
-
19
-
-
44649127698
-
-
EzStego 〈http://www.securityfocus.com/tools/586〉.
-
EzStego 〈http://www.securityfocus.com/tools/586〉.
-
-
-
-
20
-
-
44649145561
-
-
F5 〈http://wwwrn.inf.tu-dresden.de/%7Ewestfeld/f5.html〉.
-
F5 〈http://wwwrn.inf.tu-dresden.de/%7Ewestfeld/f5.html〉.
-
-
-
-
21
-
-
44649175269
-
-
Hide4PGP 〈http://www.heinz-repp.onlinehome.de/Hide4PGP.htm〉.
-
Hide4PGP 〈http://www.heinz-repp.onlinehome.de/Hide4PGP.htm〉.
-
-
-
-
22
-
-
44649134884
-
-
JP Hide&Seek 〈ftp://ftp.gwdg.de/pub/linux/misc/ppdd/jphs_05.zip〉.
-
JP Hide&Seek 〈ftp://ftp.gwdg.de/pub/linux/misc/ppdd/jphs_05.zip〉.
-
-
-
-
23
-
-
44649164782
-
-
S-Tools 〈ftp://ftp.ntua.gr/pub/crypt/mirrors/idea.sec.dsi.unimi.it/code/s-tools4.zip〉.
-
S-Tools 〈ftp://ftp.ntua.gr/pub/crypt/mirrors/idea.sec.dsi.unimi.it/code/s-tools4.zip〉.
-
-
-
-
24
-
-
44649090341
-
-
Snow 〈http://www.darkside.com.au/snow/index.html〉.
-
Snow 〈http://www.darkside.com.au/snow/index.html〉.
-
-
-
-
26
-
-
31844448106
-
A robust watermarking scheme using self-reference image
-
Liu J.-L., Lou D.-C., Chang M.-C., and Tso H.-K. A robust watermarking scheme using self-reference image. Comput. Stand. Interfaces 28 3 (2006) 356-367
-
(2006)
Comput. Stand. Interfaces
, vol.28
, Issue.3
, pp. 356-367
-
-
Liu, J.-L.1
Lou, D.-C.2
Chang, M.-C.3
Tso, H.-K.4
-
27
-
-
2342551565
-
-
D.-C. Lou, J.-L. Liu, M.-C. Chang, Digital watermarking using multiresolution wavelet transform, in: Proceedings of the IEEE 37th Annual International Carnahan Conference on Security Technology, 2003, pp. 370-377.
-
D.-C. Lou, J.-L. Liu, M.-C. Chang, Digital watermarking using multiresolution wavelet transform, in: Proceedings of the IEEE 37th Annual International Carnahan Conference on Security Technology, 2003, pp. 370-377.
-
-
-
-
28
-
-
10744222259
-
A robust watermarking scheme based on the just-noticeable-distortion
-
Lou D.-C., and Liu J.-L. A robust watermarking scheme based on the just-noticeable-distortion. J. Chung Cheng Inst. Technol. 31 2 (2003) 11-22
-
(2003)
J. Chung Cheng Inst. Technol.
, vol.31
, Issue.2
, pp. 11-22
-
-
Lou, D.-C.1
Liu, J.-L.2
-
31
-
-
84892764719
-
-
A. Westfeld, A. Pfitzmann, Attacks on steganographic systems, in: Proceedings of the Third International Workshop on Information Hiding, 2000, pp. 61-76.
-
A. Westfeld, A. Pfitzmann, Attacks on steganographic systems, in: Proceedings of the Third International Workshop on Information Hiding, 2000, pp. 61-76.
-
-
-
-
32
-
-
0242497150
-
-
J. Fridrich, M. Goljan, D. Hogea, New methodology for breaking steganographic techniques for JPEGs, in: Proceedings of SPIE: Security and Watermarking of Multimedia Contents, vol. 5020, 2003, pp. 143-155.
-
J. Fridrich, M. Goljan, D. Hogea, New methodology for breaking steganographic techniques for JPEGs, in: Proceedings of SPIE: Security and Watermarking of Multimedia Contents, vol. 5020, 2003, pp. 143-155.
-
-
-
-
33
-
-
44649201816
-
-
ISO/IEC, IS 10918, ITU-T, Rec. T.81, Information technology-digital compression and coding of continuous-tone still images, part 1: requirements and guidelines, 1992.
-
ISO/IEC, IS 10918, ITU-T, Rec. T.81, Information technology-digital compression and coding of continuous-tone still images, part 1: requirements and guidelines, 1992.
-
-
-
-
34
-
-
44649083426
-
-
The MathWorks 〈http://www.mathworks.com/index.shtml〉.
-
The MathWorks 〈http://www.mathworks.com/index.shtml〉.
-
-
-
|