메뉴 건너뛰기




Volumn 31, Issue 2, 2009, Pages 458-464

Hiding data in spatial domain images with distortion tolerance

Author keywords

Copyright; Data hiding; Distortion tolerance

Indexed keywords

ERRORS; IMAGE ENHANCEMENT;

EID: 55849148439     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2008.05.010     Document Type: Article
Times cited : (82)

References (26)
  • 1
    • 0000326312 scopus 로고
    • Picture data encryption using scan patterns
    • Bourbakis N., and Alexopoulos C. Picture data encryption using scan patterns. Pattern Recognition 25 6 (1992) 567-581
    • (1992) Pattern Recognition , vol.25 , Issue.6 , pp. 567-581
    • Bourbakis, N.1    Alexopoulos, C.2
  • 2
    • 0346216907 scopus 로고    scopus 로고
    • Hiding data in images by simple LSB substitution
    • Chan C.K., and Cheng L.M. Hiding data in images by simple LSB substitution. Pattern Recognition 37 3 (2004) 469-474
    • (2004) Pattern Recognition , vol.37 , Issue.3 , pp. 469-474
    • Chan, C.K.1    Cheng, L.M.2
  • 3
    • 0036497685 scopus 로고    scopus 로고
    • A steganographic method based upon JPEG and quantization table modification
    • Chang C.C., Chen T.S., and Chung L.Z. A steganographic method based upon JPEG and quantization table modification. Information Sciences 141 (Mar. 2002) 123-138
    • (2002) Information Sciences , vol.141 , pp. 123-138
    • Chang, C.C.1    Chen, T.S.2    Chung, L.Z.3
  • 6
  • 11
    • 4444342040 scopus 로고    scopus 로고
    • Secret image sharing with steganography and authentication
    • Lin C.C., and Tsai W.H. Secret image sharing with steganography and authentication. Journal of Systems and Software 73 (Nov. 2004) 405-414
    • (2004) Journal of Systems and Software , vol.73 , pp. 405-414
    • Lin, C.C.1    Tsai, W.H.2
  • 12
    • 25144448272 scopus 로고    scopus 로고
    • A hierarchical digital watermarking method for image tamper detection and recovery
    • Lin P.L., Hsieh C.K., and Huang P.W. A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 38 (Dec. 2005) 2519-2529
    • (2005) Pattern Recognition , vol.38 , pp. 2519-2529
    • Lin, P.L.1    Hsieh, C.K.2    Huang, P.W.3
  • 13
    • 2642515522 scopus 로고    scopus 로고
    • A steganography scheme for secure communication based on the Chaos and Euler theorem
    • Lou D.C., and Sung C.H. A steganography scheme for secure communication based on the Chaos and Euler theorem. IEEE Transactions on Multimedia 6 3 (2004) 501-509
    • (2004) IEEE Transactions on Multimedia , vol.6 , Issue.3 , pp. 501-509
    • Lou, D.C.1    Sung, C.H.2
  • 14
    • 0035473830 scopus 로고    scopus 로고
    • Multipurpose watermarking for image authentication and protection
    • Lu C.S., and Liao H.Y. Multipurpose watermarking for image authentication and protection. IEEE Transactions on Image Processing 10 (Oct. 2001) 1579-1592
    • (2001) IEEE Transactions on Image Processing , vol.10 , pp. 1579-1592
    • Lu, C.S.1    Liao, H.Y.2
  • 15
    • 0348108146 scopus 로고    scopus 로고
    • Lossless compression and information hiding in images
    • Maniccam S.S., and Bourbakis N. Lossless compression and information hiding in images. Pattern Recognition 37 3 (2004) 475-486
    • (2004) Pattern Recognition , vol.37 , Issue.3 , pp. 475-486
    • Maniccam, S.S.1    Bourbakis, N.2
  • 16
    • 17644417485 scopus 로고    scopus 로고
    • Novel robust watermarking technique in dithering halfton images
    • Pei S.C., Guo J.M., and Lee H. Novel robust watermarking technique in dithering halfton images. IEEE Signal Processing Letters 12 (Apr. 2005) 333-336
    • (2005) IEEE Signal Processing Letters , vol.12 , pp. 333-336
    • Pei, S.C.1    Guo, J.M.2    Lee, H.3
  • 18
    • 0001217738 scopus 로고
    • The prisoners' problem and the subliminal channel
    • Simmons G.J. The prisoners' problem and the subliminal channel. CRYPTO'83 (1983) 51-67
    • (1983) CRYPTO'83 , pp. 51-67
    • Simmons, G.J.1
  • 19
    • 0142057129 scopus 로고    scopus 로고
    • A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
    • Thien C.C., and Lin J.C. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition vol. 36 (Dec. 2003) 2875-2881
    • (2003) Pattern Recognition , vol.36 , pp. 2875-2881
    • Thien, C.C.1    Lin, J.C.2
  • 20
    • 0035283377 scopus 로고    scopus 로고
    • Image hiding by optimal LSB substitution and genetic algorithm
    • Wang R.Z., Lin C.F., and Lin J.C. Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition 34 3 (2001) 671-683
    • (2001) Pattern Recognition , vol.34 , Issue.3 , pp. 671-683
    • Wang, R.Z.1    Lin, C.F.2    Lin, J.C.3
  • 21
    • 0034514476 scopus 로고    scopus 로고
    • Hiding data in images by optimal moderately-significant-bit replacement
    • Wang R.Z., Lin C.P., and Lin J.C. Hiding data in images by optimal moderately-significant-bit replacement. IEE Electronics Letters 36 25 (2000) 2069-2070
    • (2000) IEE Electronics Letters , vol.36 , Issue.25 , pp. 2069-2070
    • Wang, R.Z.1    Lin, C.P.2    Lin, J.C.3
  • 22
    • 14844354093 scopus 로고    scopus 로고
    • Steganography of capacity required using modulo operator for emõbedding secret image
    • Wang S.J. Steganography of capacity required using modulo operator for emõbedding secret image. Applied Mathematics and Computation 164 (May 2005) 99-116
    • (2005) Applied Mathematics and Computation , vol.164 , pp. 99-116
    • Wang, S.J.1
  • 24
    • 2442604250 scopus 로고    scopus 로고
    • Sharing and hiding secret images with size constraint
    • Wu Y.S., Thien C.C., and Lin C.C. Sharing and hiding secret images with size constraint. Pattern Recognition 37 7 (2004) 1377-1385
    • (2004) Pattern Recognition , vol.37 , Issue.7 , pp. 1377-1385
    • Wu, Y.S.1    Thien, C.C.2    Lin, C.C.3
  • 25
    • 23344435690 scopus 로고    scopus 로고
    • Print-and-scan model and the watermarking countermeasure
    • Yu L., Niu X., and Sun S. Print-and-scan model and the watermarking countermeasure. Image and Vision Computing 23 9 (2005) 807-814
    • (2005) Image and Vision Computing , vol.23 , Issue.9 , pp. 807-814
    • Yu, L.1    Niu, X.2    Sun, S.3
  • 26
    • 11844253853 scopus 로고    scopus 로고
    • Steganography using multiple-base notational system and human vision sensitivity
    • Zhang X., and Wang S. Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Processing Letters 12 (Jan. 2005) 67-70
    • (2005) IEEE Signal Processing Letters , vol.12 , pp. 67-70
    • Zhang, X.1    Wang, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.