메뉴 건너뛰기




Volumn 1, Issue , 2008, Pages 515-518

A minimal Euclidean distance searching technique for Sudoku steganography

Author keywords

Data hiding; Steganography; Sudoku

Indexed keywords

DATA HIDING; DIGITAL IMAGES; EMBEDDING CAPACITIES; EUCLIDEAN DISTANCES; LOCATED ELEMENTS; MANHATTAN DISTANCES; MINIMAL DISTORTIONS; SEARCHING TECHNIQUES; SECRET MESSAGES; STEGANOGRAPHY; STEGO IMAGES; SUDOKU; VISUAL QUALITIES;

EID: 62449319548     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISISE.2008.153     Document Type: Conference Paper
Times cited : (45)

References (11)
  • 1
    • 0032680807 scopus 로고    scopus 로고
    • Information Hiding-A Survey
    • F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information Hiding-A Survey," Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, vol. 87, no. 7, pp. 1062-1078, 1999.
    • (1999) Proceedings of the IEEE , vol.87 , Issue.7 , pp. 1062-1078
    • Petitcolas, F.A.P.1    Anderson, R.J.2    Kuhn, M.G.3
  • 2
    • 0037411306 scopus 로고    scopus 로고
    • Finding Optimal Least-Significant-Bit Substitution in Image Hiding by Dynamic Programming Strategy
    • C. C. Chang, J. Y. Hsiao and C. S. Chan, "Finding Optimal Least-Significant-Bit Substitution in Image Hiding by Dynamic Programming Strategy," Pattern Recognition, vol. 36, no. 7, pp. 1583-1595, 2003.
    • (2003) Pattern Recognition , vol.36 , Issue.7 , pp. 1583-1595
    • Chang, C.C.1    Hsiao, J.Y.2    Chan, C.S.3
  • 3
    • 0346216907 scopus 로고    scopus 로고
    • Hiding Data in Images by Simple LSB Substitution
    • C. K. Chan and L. M. Cheng, "Hiding Data in Images by Simple LSB Substitution," Pattern Recognition, vol. 37, no. 3, pp. 469-474, 2004.
    • (2004) Pattern Recognition , vol.37 , Issue.3 , pp. 469-474
    • Chan, C.K.1    Cheng, L.M.2
  • 4
    • 0037410595 scopus 로고    scopus 로고
    • A Steganographic Method for Images by Pixel-Value Differencing
    • D. C. Wu and W. H. Tsai, "A Steganographic Method for Images by Pixel-Value Differencing," Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1613-1626, 2003.
    • (2003) Pattern Recognition Letters , vol.24 , Issue.9-10 , pp. 1613-1626
    • Wu, D.C.1    Tsai, W.H.2
  • 5
    • 0034249378 scopus 로고    scopus 로고
    • A Robust DCT-based Watermarking for Copyright Protection
    • S. D. Lin and C. F. Chen, "A Robust DCT-based Watermarking for Copyright Protection," IEEE Transactions on Consumer Electron, vol. 46, no. 3, pp. 415-421, 2000.
    • (2000) IEEE Transactions on Consumer Electron , vol.46 , Issue.3 , pp. 415-421
    • Lin, S.D.1    Chen, C.F.2
  • 6
    • 33845650617 scopus 로고    scopus 로고
    • Reversible Steganography for VQ-compressed Images Using Side Matching and Relocation
    • C. C. Chang, and C. Y. Lin, "Reversible Steganography for VQ-compressed Images Using Side Matching and Relocation," IEEE Transactions on Information Forensics and Security, vol. 1, no. 4, pp. 493-501, 2006.
    • (2006) IEEE Transactions on Information Forensics and Security , vol.1 , Issue.4 , pp. 493-501
    • Chang, C.C.1    Lin, C.Y.2
  • 7
    • 11844252006 scopus 로고    scopus 로고
    • Cyber Warfare: Steganography vs. Steganalysis
    • H. Wang and S. Wang, "Cyber Warfare: Steganography vs. Steganalysis," Communications of the ACM, vol. 47, no. 10, 2004.
    • (2004) Communications of the ACM , vol.47 , Issue.10
    • Wang, H.1    Wang, S.2
  • 8
  • 9
    • 47349094397 scopus 로고    scopus 로고
    • Efficient Steganographic Embedding by Exploiting Modification Direction
    • X. Zhang and S. Wang, "Efficient Steganographic Embedding by Exploiting Modification Direction," IEEE Communications Letters, vol. 10, no. 11, pp. 781-783, 2006.
    • (2006) IEEE Communications Letters , vol.10 , Issue.11 , pp. 781-783
    • Zhang, X.1    Wang, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.