-
1
-
-
0030384775
-
Techniques for data hiding
-
Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3&4): 313-336
-
(1996)
IBM Syst J
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
2
-
-
0346216907
-
Hiding data in images by simple LSB substitution
-
Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recognit 37(3): 469-474
-
(2004)
Pattern Recognit
, vol.37
, Issue.3
, pp. 469-474
-
-
Chan, C.K.1
Cheng, L.M.2
-
3
-
-
0037411306
-
Finding optimal least- significant-bit substitution in image hiding by dynamic programming strategy
-
Chang CC, Hsiao JY, Chan CS (2003) Finding optimal least- significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognit 36(7): 1583-1593
-
(2003)
Pattern Recognit
, vol.36
, Issue.7
, pp. 1583-1593
-
-
Chang, C.C.1
Hsiao, J.Y.2
Chan, C.S.3
-
4
-
-
0032663977
-
Hybrid image compression methods based on vector quantization and block truncation coding
-
Chang CC, Hu YC (1999) Hybrid image compression methods based on vector quantization and block truncation coding. Opt Eng 38(4): 591-598
-
(1999)
Opt Eng
, vol.38
, Issue.4
, pp. 591-598
-
-
Chang, C.C.1
Hu, Y.C.2
-
5
-
-
33747782523
-
New image steganographic methods using run-length approach
-
Chang CC, Lin CY, Wang YZ (2006) New image steganographic methods using run-length approach. Inform Sci 176(22): 3393-3408
-
(2006)
Inform Sci
, vol.176
, Issue.22
, pp. 3393-3408
-
-
Chang, C.C.1
Lin, C.Y.2
Wang, Y.Z.3
-
6
-
-
33751501445
-
A reversible data hiding scheme based on side match vector quantization
-
Chang CC, Tai WL, Lin CC (2006) A reversible data hiding scheme based on side match vector quantization. IEEE Trans Circuits Syst Video Technol 16(10): 1301-1308
-
(2006)
IEEE Trans Circuits Syst Video Technol
, vol.16
, Issue.10
, pp. 1301-1308
-
-
Chang, C.C.1
Tai, W.L.2
Lin, C.C.3
-
7
-
-
0032595065
-
Edge enhancement of remote image data in the DCT domain
-
Chen B, Latifi S, Kanai J (1999) Edge enhancement of remote image data in the DCT domain. Image Vis Comput 17(12): 913-921
-
(1999)
Image Vis Comput
, vol.17
, Issue.12
, pp. 913-921
-
-
Chen, B.1
Latifi, S.2
Kanai, J.3
-
8
-
-
0032596321
-
A genetic algorithm approach to multilevel absolute moment block truncation coding
-
Chen WJ, Tai SC (1999) A genetic algorithm approach to multilevel absolute moment block truncation coding. IEICE Trans Fundam Electron Commun Comput Sci E82-A(8): 1456-1462
-
(1999)
IEICE Trans Fundam Electron Commun Comput Sci
, vol.E82-A
, Issue.8
, pp. 1456-1462
-
-
Chen, W.J.1
Tai, S.C.2
-
9
-
-
33846205503
-
Using a simple and fast image compression algorithm to hide secret information
-
Chuang JC, Chang CC (2006) Using a simple and fast image compression algorithm to hide secret information. Int J Comput Appl 28: 1735-1743
-
(2006)
Int J Comput Appl
, vol.28
, pp. 1735-1743
-
-
Chuang, J.C.1
Chang, C.C.2
-
10
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox IJ, Kilian J, Leigiton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12): 1673-1687
-
(1997)
IEEE Trans Image Process
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leigiton, T.3
Shamoon, T.4
-
11
-
-
0141954068
-
Adaptive data hiding based on VQ compressed images
-
Du WC, Hsu WJ (2003) Adaptive data hiding based on VQ compressed images. IEE Proc Vis Image Signal Process 150(4): 233-238
-
(2003)
IEE Proc Vis Image Signal Process
, vol.150
, Issue.4
, pp. 233-238
-
-
Du, W.C.1
Hsu, W.J.2
-
12
-
-
0032785523
-
Hidden digital watermarks in images
-
Hsu CT, Wu JL (1999) Hidden digital watermarks in images. IEEE Trans Image Process 8(1): 58-68
-
(1999)
IEEE Trans Image Process
, vol.8
, Issue.1
, pp. 58-68
-
-
Hsu, C.T.1
Wu, J.L.2
-
13
-
-
0033906461
-
Quadtree-segmented image coding schemes using vector quantization and block truncation coding
-
Hu YC, Chang CC (1999) Quadtree-segmented image coding schemes using vector quantization and block truncation coding. Opt Eng 39(2): 464-471
-
(1999)
Opt Eng
, vol.39
, Issue.2
, pp. 464-471
-
-
Hu, Y.C.1
Chang, C.C.2
-
14
-
-
0011958281
-
On RD optimized progressive image coding using JPEG
-
In J, Hsiarani S, Kossentini F (1999) On RD optimized progressive image coding using JPEG. IEEE Trans Image Process 8(11): 1630-1638
-
(1999)
IEEE Trans Image Process
, vol.8
, Issue.11
, pp. 1630-1638
-
-
In, J.1
Hsiarani, S.2
Kossentini, F.3
-
15
-
-
28844486742
-
Reversible data embedding into images using Wavelet t-techniques and sorting
-
Kamstra LH, Henk JAM (2005) Reversible data embedding into images using Wavelet t-techniques and sorting. IEEE Trans Image Process 14(12): 2082-2090
-
(2005)
IEEE Trans Image Process
, vol.14
, Issue.12
, pp. 2082-2090
-
-
Kamstra, L.H.1
Henk, J.A.M.2
-
16
-
-
0026854051
-
Side match and overlap match vector quantizers for images
-
Kim T (1992) Side match and overlap match vector quantizers for images. IEEE Trans Image Process 1(2): 170-185
-
(1992)
IEEE Trans Image Process
, vol.1
, Issue.2
, pp. 170-185
-
-
Kim, T.1
-
19
-
-
0034247755
-
Side-match finite-state vector quantization with adaptive block classification for image compression
-
Lin SD, Shie SC (2000) Side-match finite-state vector quantization with adaptive block classification for image compression. IEICE Trans Inform Syst E83-D(8): 1671-1678
-
(2000)
IEICE Trans Inform Syst
, vol.E83-D
, Issue.8
, pp. 1671-1678
-
-
Lin, S.D.1
Shie, S.C.2
-
21
-
-
0742310493
-
A new watermarking technique for multimedia protection
-
In: Ling G, Jan L, Kung SY (eds) Chap. 18. CRC Press, Boca Raton
-
Lu CS, Huang SK, Sze CJ, Liao HYM (2000) A new watermarking technique for multimedia protection. In: Ling G, Jan L, Kung SY (eds) Multimedia image and video processing, Chap. 18. CRC Press, Boca Raton, pp 507-530
-
(2000)
Multimedia Image and Video Processing
, pp. 507-530
-
-
Lu, C.S.1
Huang, S.K.2
Sze, C.J.3
Liao, H.Y.M.4
-
22
-
-
0033907535
-
Digital image watermarking technique based on vector quantization
-
Lu ZM, Sun SH (2000) Digital image watermarking technique based on vector quantization. Electron Lett 36(4): 303-305
-
(2000)
Electron Lett
, vol.36
, Issue.4
, pp. 303-305
-
-
Lu, Z.M.1
Sun, S.H.2
-
24
-
-
0033233322
-
Wavelet image compression - The quadtree coding approach
-
Munteanu A, Cornelis J, Auwera GVD, Cristea P (1999) Wavelet image compression - the quadtree coding approach. IEEE Trans Technol Biomed 3(3): 176-185
-
(1999)
IEEE Trans Technol Biomed
, vol.3
, Issue.3
, pp. 176-185
-
-
Munteanu, A.1
Cornelis, J.2
Auwera, G.V.D.3
Cristea, P.4
-
25
-
-
0024056708
-
Image coding using vector quantization: A review
-
Nasrabadi NM, King RA (1988) Image coding using vector quantization: A review. IEEE Trans Commun 36(8): 957-971
-
(1988)
IEEE Trans Commun
, vol.36
, Issue.8
, pp. 957-971
-
-
Nasrabadi, N.M.1
King, R.A.2
-
26
-
-
33646242245
-
Low power block-based watermarking algorithm
-
Pai YT, Ruan SJ (2006) Low power block-based watermarking algorithm. IEICE Trans Inform Syst E89-D(4): 1507-1514
-
(2006)
IEICE Trans Inform Syst
, vol.E89-D
, Issue.4
, pp. 1507-1514
-
-
Pai, Y.T.1
Ruan, S.J.2
-
28
-
-
84955568589
-
Information hiding terminology, Information Hiding: First International Workshop
-
Cambridge, UK
-
Pfitzman B (1996) Information hiding terminology, Information Hiding: First International Workshop. Springer Lecture Notes in Computer Science, Cambridge, UK, vol 1174, pp 347-350
-
(1996)
Springer Lecture Notes in Computer Science
, vol.1174
, pp. 347-350
-
-
Pfitzman, B.1
-
29
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest R, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2): 120-126
-
(1978)
Commun ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
30
-
-
32244441138
-
Adaptive data hiding based on SMVQ prediction
-
Shie SC, Lin SD, Fang CM (2006) Adaptive data hiding based on SMVQ prediction. IEICE Trans Inform Syst E89-D(1): 358-362
-
(2006)
IEICE Trans Inform Syst
, vol.E89-D
, Issue.1
, pp. 358-362
-
-
Shie, S.C.1
Lin, S.D.2
Fang, C.M.3
-
31
-
-
0346216903
-
Genetic watermarking based on transform domain techniques
-
Shieh CS, Huang HC, Wang FH, Pan JS (2004) Genetic watermarking based on transform domain techniques. Pattern Recognit 37(3): 555-565
-
(2004)
Pattern Recognit
, vol.37
, Issue.3
, pp. 555-565
-
-
Shieh, C.S.1
Huang, H.C.2
Wang, F.H.3
Pan, J.S.4
-
32
-
-
0038471599
-
Genetic algorithm for single bit-map AMBTC coding of color images
-
Tai SC, Chen WJ, Cheng PJ (1998) Genetic algorithm for single bit-map AMBTC coding of color images. Opt Eng 37(9): 2483-2490
-
(1998)
Opt Eng
, vol.37
, Issue.9
, pp. 2483-2490
-
-
Tai, S.C.1
Chen, W.J.2
Cheng, P.J.3
-
34
-
-
0035283377
-
Image hiding by optimal LSB substitution and genetic algorithm
-
Wang RZ, Lin CF, Lin JC (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognit 34(3): 671-683
-
(2001)
Pattern Recognit
, vol.34
, Issue.3
, pp. 671-683
-
-
Wang, R.Z.1
Lin, C.F.2
Lin, J.C.3
-
35
-
-
47349094397
-
Efficient steganographic embedding by exploiting modification direction
-
Zhang XP, Wang SZ (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11): 1-3
-
(2006)
IEEE Commun Lett
, vol.10
, Issue.11
, pp. 1-3
-
-
Zhang, X.P.1
Wang, S.Z.2
|