-
1
-
-
33751536764
-
A content-based authentication system with lossless data hiding
-
D. Zou, C. W. Wu, G. Xuan, and Y. Q. Shi, "A content-based authentication system with lossless data hiding," in Proc. Multimedia Expo Int. Conf., 2003, vol. 2, pp. 6-9.
-
(2003)
Proc. Multimedia Expo Int. Conf
, vol.2
, pp. 6-9
-
-
Zou, D.1
Wu, C.W.2
Xuan, G.3
Shi, Y.Q.4
-
2
-
-
49549097199
-
The survey of digital watermarking-based image authentication techniques
-
T. Liu and Z. D. Qiu, "The survey of digital watermarking-based image authentication techniques," in Signal Process., 2002, vol. 2, pp. 1556-1559.
-
(2002)
Signal Process
, vol.2
, pp. 1556-1559
-
-
Liu, T.1
Qiu, Z.D.2
-
3
-
-
0035330787
-
Digital steganographic: Hiding data within data
-
May/Jun
-
D. Artz, "Digital steganographic: Hiding data within data," IEEE Internet Comput., vol. 5, no. 3, pp. 75-80, May/Jun. 2001.
-
(2001)
IEEE Internet Comput
, vol.5
, Issue.3
, pp. 75-80
-
-
Artz, D.1
-
4
-
-
0031331952
-
Data encryption: A non-mathematical approach
-
H. J. Highland, "Data encryption: A non-mathematical approach," Comput. Security, vol. 16, pp. 369-386, 1997.
-
(1997)
Comput. Security
, vol.16
, pp. 369-386
-
-
Highland, H.J.1
-
5
-
-
0032666176
-
Dynamical cryptography based on synchronized chaotic systems
-
Y. H. Chu and S. Chang, "Dynamical cryptography based on synchronized chaotic systems," Inst. Elect. Eng. Election. Lett., vol. 35, no. 12, pp. 974-975, 1999.
-
(1999)
Inst. Elect. Eng. Election. Lett
, vol.35
, Issue.12
, pp. 974-975
-
-
Chu, Y.H.1
Chang, S.2
-
6
-
-
0030384775
-
Techniques for data hiding
-
D. W. Bender, N. M. Gruhl, and A. Lu, 'Techniques for data hiding," IBM Syst. J., vol. 35, pp. 313-316, 1996.
-
(1996)
IBM Syst. J
, vol.35
, pp. 313-316
-
-
Bender, D.W.1
Gruhl, N.M.2
Lu, A.3
-
7
-
-
0032070303
-
On the limits of steganography
-
May
-
R. R. Anderson and F. A. P. Peticolas, "On the limits of steganography," IEEE J. Sel. Areas Commun, vol. 16, no. 4, pp. 474-481, May 1998.
-
(1998)
IEEE J. Sel. Areas Commun
, vol.16
, Issue.4
, pp. 474-481
-
-
Anderson, R.R.1
Peticolas, F.A.P.2
-
8
-
-
0033716537
-
High capacity image steganography model
-
Y. K. Lee and L. H. Chen, "High capacity image steganography model," Proc. Inst. Elect. Eng. Vis. Image, Signal Processing, vol. 147, no. 3, pp. 288-294, 2000.
-
(2000)
Proc. Inst. Elect. Eng. Vis. Image, Signal Processing
, vol.147
, Issue.3
, pp. 288-294
-
-
Lee, Y.K.1
Chen, L.H.2
-
9
-
-
0035283377
-
Image hiding by optimal LSB substitution and genetic algorithm
-
R. Z. Wang, C. F. Lin, and J. C. Lin, "Image hiding by optimal LSB substitution and genetic algorithm," Pattern Recognit., vol. 34, no. 3, pp. 671-683, 2000.
-
(2000)
Pattern Recognit
, vol.34
, Issue.3
, pp. 671-683
-
-
Wang, R.Z.1
Lin, C.F.2
Lin, J.C.3
-
10
-
-
0142057129
-
A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
-
C. C. Thien and J. C. Lin, "A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function," Pattern Recognit., vol. 36, no. 3, pp. 2875-2881, 2003.
-
(2003)
Pattern Recognit
, vol.36
, Issue.3
, pp. 2875-2881
-
-
Thien, C.C.1
Lin, J.C.2
-
11
-
-
0346216907
-
Hiding data in images by simple LSB substitution
-
C. K. Chan and L. M. Chen, "Hiding data in images by simple LSB substitution," Pattern Recognit., vol. 37, no. 3, pp. 469-474, 2004.
-
(2004)
Pattern Recognit
, vol.37
, Issue.3
, pp. 469-474
-
-
Chan, C.K.1
Chen, L.M.2
-
12
-
-
0037411306
-
Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy
-
C. C. Chang, J. Y. Hsiao, and C. S. Chan, "Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy," Pattern Recognit., vol. 36, no. 7, pp. 1583-1595, 2003.
-
(2003)
Pattern Recognit
, vol.36
, Issue.7
, pp. 1583-1595
-
-
Chang, C.C.1
Hsiao, J.Y.2
Chan, C.S.3
-
13
-
-
84993973063
-
Weighted bipartite graph for locating optimal LSB substitution for secret embedding
-
C. H. Yang and S. J. Wang, "Weighted bipartite graph for locating optimal LSB substitution for secret embedding," J. Discrete Math. Sci. Cryptograph., vol. 9, no. 1, pp. 153-164, 2006.
-
(2006)
J. Discrete Math. Sci. Cryptograph
, vol.9
, Issue.1
, pp. 153-164
-
-
Yang, C.H.1
Wang, S.J.2
-
14
-
-
4544351078
-
A steganographic method for digital images using side match
-
C. C. Chang and H. W. Tseng, "A steganographic method for digital images using side match," Pattern Recognit. Lett., vol. 25, no. 12, pp. 1431-1437, 2004.
-
(2004)
Pattern Recognit. Lett
, vol.25
, Issue.12
, pp. 1431-1437
-
-
Chang, C.C.1
Tseng, H.W.2
-
15
-
-
35848929919
-
A high quality steganography method with pixel-value differencing and modulus function
-
C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, "A high quality steganography method with pixel-value differencing and modulus function," J. Syst. Softw., vol. 81, pp. 150-158, 2008.
-
(2008)
J. Syst. Softw
, vol.81
, pp. 150-158
-
-
Wang, C.M.1
Wu, N.I.2
Tsai, C.S.3
Hwang, M.S.4
-
16
-
-
47349129360
-
A steganographic method for digital images by multi-pixel differencing
-
Taipei, Taiwan, R.O.C
-
C. H. Yang and C. Y. Weng, "A steganographic method for digital images by multi-pixel differencing," in Proc Int. Comput. Symp., Taipei, Taiwan, R.O.C., 2006, pp. 831-836.
-
(2006)
Proc Int. Comput. Symp
, pp. 831-836
-
-
Yang, C.H.1
Weng, C.Y.2
-
17
-
-
0037410595
-
A steganographic method for images by pixel-value differencing
-
D. C. Wu and W. H. Tsai, "A steganographic method for images by pixel-value differencing," Pattern Recognit. Lett., vol. 24, no. 9-10, pp. 1613-1626, 2003.
-
(2003)
Pattern Recognit. Lett
, vol.24
, Issue.9-10
, pp. 1613-1626
-
-
Wu, D.C.1
Tsai, W.H.2
-
18
-
-
27144475598
-
Image steganographic scheme based on pixel-value differencing and LSB replacement methods
-
H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, "Image steganographic scheme based on pixel-value differencing and LSB replacement methods," Proc Inst. Elect. Eng., Vis. Images Signal Process., vol. 152, no. 5, pp. 611-615, 2005.
-
(2005)
Proc Inst. Elect. Eng., Vis. Images Signal Process
, vol.152
, Issue.5
, pp. 611-615
-
-
Wu, H.C.1
Wu, N.I.2
Tsai, C.S.3
Hwang, M.S.4
-
19
-
-
47349093476
-
Analyses of pixel-value- differencing schemes with LSB replacement in stegonagraphy
-
Kaohsiung City, Taiwan, R.O.C
-
C. H. Yang, S. J. Wang, and C. Y. Weng, "Analyses of pixel-value- differencing schemes with LSB replacement in stegonagraphy," in Proc. 3rd Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung City, Taiwan, R.O.C., 2007, pp. 445-448.
-
(2007)
Proc. 3rd Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing
, pp. 445-448
-
-
Yang, C.H.1
Wang, S.J.2
Weng, C.Y.3
-
20
-
-
26844434738
-
-
Berlin, Germany: Springer-Verlag
-
Y. R. Park, H. H. Kang, S. U. Shin, and K. R. Kwon, A Steganogmphic Scheme in Digital Images Using Information of Neighboring Pixels. Berlin, Germany: Springer-Verlag, 2005, vol. 3612, pp. 962-968.
-
(2005)
A Steganogmphic Scheme in Digital Images Using Information of Neighboring Pixels
, vol.3612
, pp. 962-968
-
-
Park, Y.R.1
Kang, H.H.2
Shin, S.U.3
Kwon, K.R.4
-
21
-
-
0033601691
-
A fair benchmark, for image watermarking systems
-
San Jose, CA
-
M. Kutter and F. A. P. Petitcolas, "A fair benchmark, for image watermarking systems," in Proc. SPIE Conf. Security Watermarking of Multimedia Contents, San Jose, CA, 1999, vol. 3657, pp. 226-239.
-
(1999)
Proc. SPIE Conf. Security Watermarking of Multimedia Contents
, vol.3657
, pp. 226-239
-
-
Kutter, M.1
Petitcolas, F.A.P.2
|