-
1
-
-
0000326312
-
Picture data encryption using scan patterns
-
Bourbakis N., and Alexopoulos C. Picture data encryption using scan patterns. Pattern Recognition 25 6 (1992) 567-581
-
(1992)
Pattern Recognition
, vol.25
, Issue.6
, pp. 567-581
-
-
Bourbakis, N.1
Alexopoulos, C.2
-
2
-
-
0346216907
-
Hiding data in images by simple LSB substitution
-
Chan C.K., and Cheng L.M. Hiding data in images by simple LSB substitution. Pattern Recognition 37 3 (2004) 469-474
-
(2004)
Pattern Recognition
, vol.37
, Issue.3
, pp. 469-474
-
-
Chan, C.K.1
Cheng, L.M.2
-
3
-
-
0036497685
-
A steganographic method based upon JPEG and quantization table modification
-
Chang C.C., Chen T.S., and Chung L.Z. A steganographic method based upon JPEG and quantization table modification. Information Sciences 141 (Mar. 2002) 123-138
-
(2002)
Information Sciences
, vol.141
, pp. 123-138
-
-
Chang, C.C.1
Chen, T.S.2
Chung, L.Z.3
-
11
-
-
4444342040
-
Secret image sharing with steganography and authentication
-
Lin C.C., and Tsai W.H. Secret image sharing with steganography and authentication. Journal of Systems and Software 73 (Nov. 2004) 405-414
-
(2004)
Journal of Systems and Software
, vol.73
, pp. 405-414
-
-
Lin, C.C.1
Tsai, W.H.2
-
12
-
-
25144448272
-
A hierarchical digital watermarking method for image tamper detection and recovery
-
Lin P.L., Hsieh C.K., and Huang P.W. A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 38 (Dec. 2005) 2519-2529
-
(2005)
Pattern Recognition
, vol.38
, pp. 2519-2529
-
-
Lin, P.L.1
Hsieh, C.K.2
Huang, P.W.3
-
13
-
-
2642515522
-
A steganography scheme for secure communication based on the Chaos and Euler theorem
-
Lou D.C., and Sung C.H. A steganography scheme for secure communication based on the Chaos and Euler theorem. IEEE Transactions on Multimedia 6 3 (2004) 501-509
-
(2004)
IEEE Transactions on Multimedia
, vol.6
, Issue.3
, pp. 501-509
-
-
Lou, D.C.1
Sung, C.H.2
-
14
-
-
0035473830
-
Multipurpose watermarking for image authentication and protection
-
Lu C.S., and Liao H.Y. Multipurpose watermarking for image authentication and protection. IEEE Transactions on Image Processing 10 (Oct. 2001) 1579-1592
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, pp. 1579-1592
-
-
Lu, C.S.1
Liao, H.Y.2
-
15
-
-
0348108146
-
Lossless compression and information hiding in images
-
Maniccam S.S., and Bourbakis N. Lossless compression and information hiding in images. Pattern Recognition 37 3 (2004) 475-486
-
(2004)
Pattern Recognition
, vol.37
, Issue.3
, pp. 475-486
-
-
Maniccam, S.S.1
Bourbakis, N.2
-
16
-
-
17644417485
-
Novel robust watermarking technique in dithering halfton images
-
Pei S.C., Guo J.M., and Lee H. Novel robust watermarking technique in dithering halfton images. IEEE Signal Processing Letters 12 (Apr. 2005) 333-336
-
(2005)
IEEE Signal Processing Letters
, vol.12
, pp. 333-336
-
-
Pei, S.C.1
Guo, J.M.2
Lee, H.3
-
18
-
-
0001217738
-
The prisoners' problem and the subliminal channel
-
Simmons G.J. The prisoners' problem and the subliminal channel. CRYPTO'83 (1983) 51-67
-
(1983)
CRYPTO'83
, pp. 51-67
-
-
Simmons, G.J.1
-
19
-
-
0142057129
-
A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
-
Thien C.C., and Lin J.C. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition vol. 36 (Dec. 2003) 2875-2881
-
(2003)
Pattern Recognition
, vol.36
, pp. 2875-2881
-
-
Thien, C.C.1
Lin, J.C.2
-
20
-
-
0035283377
-
Image hiding by optimal LSB substitution and genetic algorithm
-
Wang R.Z., Lin C.F., and Lin J.C. Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition 34 3 (2001) 671-683
-
(2001)
Pattern Recognition
, vol.34
, Issue.3
, pp. 671-683
-
-
Wang, R.Z.1
Lin, C.F.2
Lin, J.C.3
-
21
-
-
0034514476
-
Hiding data in images by optimal moderately-significant-bit replacement
-
Wang R.Z., Lin C.P., and Lin J.C. Hiding data in images by optimal moderately-significant-bit replacement. IEE Electronics Letters 36 25 (2000) 2069-2070
-
(2000)
IEE Electronics Letters
, vol.36
, Issue.25
, pp. 2069-2070
-
-
Wang, R.Z.1
Lin, C.P.2
Lin, J.C.3
-
22
-
-
14844354093
-
Steganography of capacity required using modulo operator for emõbedding secret image
-
Wang S.J. Steganography of capacity required using modulo operator for emõbedding secret image. Applied Mathematics and Computation 164 (May 2005) 99-116
-
(2005)
Applied Mathematics and Computation
, vol.164
, pp. 99-116
-
-
Wang, S.J.1
-
24
-
-
2442604250
-
Sharing and hiding secret images with size constraint
-
Wu Y.S., Thien C.C., and Lin C.C. Sharing and hiding secret images with size constraint. Pattern Recognition 37 7 (2004) 1377-1385
-
(2004)
Pattern Recognition
, vol.37
, Issue.7
, pp. 1377-1385
-
-
Wu, Y.S.1
Thien, C.C.2
Lin, C.C.3
-
25
-
-
23344435690
-
Print-and-scan model and the watermarking countermeasure
-
Yu L., Niu X., and Sun S. Print-and-scan model and the watermarking countermeasure. Image and Vision Computing 23 9 (2005) 807-814
-
(2005)
Image and Vision Computing
, vol.23
, Issue.9
, pp. 807-814
-
-
Yu, L.1
Niu, X.2
Sun, S.3
-
26
-
-
11844253853
-
Steganography using multiple-base notational system and human vision sensitivity
-
Zhang X., and Wang S. Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Processing Letters 12 (Jan. 2005) 67-70
-
(2005)
IEEE Signal Processing Letters
, vol.12
, pp. 67-70
-
-
Zhang, X.1
Wang, S.2
|