-
1
-
-
0026397734
-
Differential cryptanalysis of DES-like cryptosystems
-
Biham E., and Shamir A. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology 4 1 (1991) 3-72
-
(1991)
Journal of Cryptology
, vol.4
, Issue.1
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
2
-
-
0346216907
-
Hiding data in images by simple LSB substitution
-
Chan C.K., and Cheng L.M. Hiding data in images by simple LSB substitution. Pattern Recognition 37 (2003) 469-474
-
(2003)
Pattern Recognition
, vol.37
, pp. 469-474
-
-
Chan, C.K.1
Cheng, L.M.2
-
3
-
-
0027227012
-
Image coding using variable-rate side-match finite-state vector quantization
-
Chang R.F., and Chen W.T. Image coding using variable-rate side-match finite-state vector quantization. IEEE Transactions on Image Processing 2 1 (1993) 104-108
-
(1993)
IEEE Transactions on Image Processing
, vol.2
, Issue.1
, pp. 104-108
-
-
Chang, R.F.1
Chen, W.T.2
-
4
-
-
19544379148
-
-
Chang, C.C., Lin, P.Y., 2004. A compression based data hiding scheme using vector quantization and principle component analysis. In: Proceedings of the 2004 International Conference on Cyberworlds, Tokyo, Japan, pp. 369-375.
-
Chang, C.C., Lin, P.Y., 2004. A compression based data hiding scheme using vector quantization and principle component analysis. In: Proceedings of the 2004 International Conference on Cyberworlds, Tokyo, Japan, pp. 369-375.
-
-
-
-
5
-
-
33845650617
-
Reversible steganography for VQ-compressed images using side matching and relocation
-
Chang C.C., and Lin C.Y. Reversible steganography for VQ-compressed images using side matching and relocation. IEEE Transactions on Information Forensics and Security 1 4 (2006) 493-501
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.4
, pp. 493-501
-
-
Chang, C.C.1
Lin, C.Y.2
-
6
-
-
0036497685
-
Steganographic method based upon JPEG and quantization table modification
-
Chang C.C., Hsiao J.Y., and Chung L.Z. Steganographic method based upon JPEG and quantization table modification. Information Sciences 141 2 (2002) 123-138
-
(2002)
Information Sciences
, vol.141
, Issue.2
, pp. 123-138
-
-
Chang, C.C.1
Hsiao, J.Y.2
Chung, L.Z.3
-
7
-
-
23844490861
-
Information hiding based on search-order coding for VQ indices
-
Chang C.C., Chen G.M., and Lin M.H. Information hiding based on search-order coding for VQ indices. Pattern Recognition Letters 25 (2004) 1253-1261
-
(2004)
Pattern Recognition Letters
, vol.25
, pp. 1253-1261
-
-
Chang, C.C.1
Chen, G.M.2
Lin, M.H.3
-
10
-
-
0031208678
-
A new image coding algorithm using variable-rate side-match finite-state vector quantization
-
Chen T.S., and Chang C.C. A new image coding algorithm using variable-rate side-match finite-state vector quantization. IEEE Transactions on Image Processing 6 8 (1997) 1185-1187
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.8
, pp. 1185-1187
-
-
Chen, T.S.1
Chang, C.C.2
-
14
-
-
0026854051
-
Side match and overlap match vector quantizers for images
-
Kim K. Side match and overlap match vector quantizers for images. IEEE Transactions on Image Processing 1 2 (1992) 170-185
-
(1992)
IEEE Transactions on Image Processing
, vol.1
, Issue.2
, pp. 170-185
-
-
Kim, K.1
-
15
-
-
47549099055
-
-
Lin, Y.C., Wang, C.C., 1999. Digital image watermarking by vector quantization. In: Proceedings of the 9th National Computer Symposium, Taichung, Taiwan, pp. 76-87.
-
Lin, Y.C., Wang, C.C., 1999. Digital image watermarking by vector quantization. In: Proceedings of the 9th National Computer Symposium, Taichung, Taiwan, pp. 76-87.
-
-
-
-
17
-
-
47549098691
-
-
Pan, J.S., Huang, H.C., Jain, L.C., Fang, W.C. (Eds.), 2007. Intelligent Multimedia Data Hiding: New Directions. Studies in Computational Intelligence Series. Springer, pp. 400. ISBN: 978-3-540-71168-1.
-
Pan, J.S., Huang, H.C., Jain, L.C., Fang, W.C. (Eds.), 2007. Intelligent Multimedia Data Hiding: New Directions. Studies in Computational Intelligence Series. Springer, pp. 400. ISBN: 978-3-540-71168-1.
-
-
-
-
18
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest R., Shamir A., and Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21 2 (1978) 120-126
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
20
-
-
47549119346
-
-
Tsai, P.Y, Hu, Y.C, Chang, C.C. 2002. An image hiding technique using the block truncation coding. In: Proceedings of Pacific Rim Workshop on Digital Steganography 2002, Kyushu, Japan, pp. 54-64.
-
Tsai, P.Y, Hu, Y.C, Chang, C.C. 2002. An image hiding technique using the block truncation coding. In: Proceedings of Pacific Rim Workshop on Digital Steganography 2002, Kyushu, Japan, pp. 54-64.
-
-
-
-
21
-
-
0035283377
-
Image hiding by optimal LSB substitution and genetic algorithm
-
Wang R.Z., Lin C.F., and Lin J.C. Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition 34 (2001) 671-683
-
(2001)
Pattern Recognition
, vol.34
, pp. 671-683
-
-
Wang, R.Z.1
Lin, C.F.2
Lin, J.C.3
-
22
-
-
47549089109
-
-
Wu, M.N., Lin, C.C., Chang, C.C. 2005. Hiding secret information in VQ compressed images using Voronoi diagram. In: Proceedings of the 2nd International Symposium on Voronoi Diagrams in Science and Engineering, Seoul, Korea, pp. 55-61.
-
Wu, M.N., Lin, C.C., Chang, C.C. 2005. Hiding secret information in VQ compressed images using Voronoi diagram. In: Proceedings of the 2nd International Symposium on Voronoi Diagrams in Science and Engineering, Seoul, Korea, pp. 55-61.
-
-
-
|