-
1
-
-
0032680807
-
Information Hiding-A Survey
-
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information Hiding-A Survey," Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, vol. 87, no. 7, pp. 1062-1078, 1999.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
2
-
-
0037411306
-
Finding Optimal Least-Significant-Bit Substitution in Image Hiding by Dynamic Programming Strategy
-
C. C. Chang, J. Y. Hsiao and C. S. Chan, "Finding Optimal Least-Significant-Bit Substitution in Image Hiding by Dynamic Programming Strategy," Pattern Recognition, vol. 36, no. 7, pp. 1583-1595, 2003.
-
(2003)
Pattern Recognition
, vol.36
, Issue.7
, pp. 1583-1595
-
-
Chang, C.C.1
Hsiao, J.Y.2
Chan, C.S.3
-
3
-
-
0346216907
-
Hiding Data in Images by Simple LSB Substitution
-
C. K. Chan and L. M. Cheng, "Hiding Data in Images by Simple LSB Substitution," Pattern Recognition, vol. 37, no. 3, pp. 469-474, 2004.
-
(2004)
Pattern Recognition
, vol.37
, Issue.3
, pp. 469-474
-
-
Chan, C.K.1
Cheng, L.M.2
-
4
-
-
0037410595
-
A Steganographic Method for Images by Pixel-Value Differencing
-
D. C. Wu and W. H. Tsai, "A Steganographic Method for Images by Pixel-Value Differencing," Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1613-1626, 2003.
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.9-10
, pp. 1613-1626
-
-
Wu, D.C.1
Tsai, W.H.2
-
5
-
-
0034249378
-
A Robust DCT-based Watermarking for Copyright Protection
-
S. D. Lin and C. F. Chen, "A Robust DCT-based Watermarking for Copyright Protection," IEEE Transactions on Consumer Electron, vol. 46, no. 3, pp. 415-421, 2000.
-
(2000)
IEEE Transactions on Consumer Electron
, vol.46
, Issue.3
, pp. 415-421
-
-
Lin, S.D.1
Chen, C.F.2
-
6
-
-
33845650617
-
Reversible Steganography for VQ-compressed Images Using Side Matching and Relocation
-
C. C. Chang, and C. Y. Lin, "Reversible Steganography for VQ-compressed Images Using Side Matching and Relocation," IEEE Transactions on Information Forensics and Security, vol. 1, no. 4, pp. 493-501, 2006.
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.4
, pp. 493-501
-
-
Chang, C.C.1
Lin, C.Y.2
-
7
-
-
11844252006
-
Cyber Warfare: Steganography vs. Steganalysis
-
H. Wang and S. Wang, "Cyber Warfare: Steganography vs. Steganalysis," Communications of the ACM, vol. 47, no. 10, 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.10
-
-
Wang, H.1
Wang, S.2
-
8
-
-
33645814428
-
LSB Matching Revisited
-
J. Mielikainen, "LSB Matching Revisited," IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, 2006.
-
(2006)
IEEE Signal Processing Letters
, vol.13
, Issue.5
, pp. 285-287
-
-
Mielikainen, J.1
-
9
-
-
47349094397
-
Efficient Steganographic Embedding by Exploiting Modification Direction
-
X. Zhang and S. Wang, "Efficient Steganographic Embedding by Exploiting Modification Direction," IEEE Communications Letters, vol. 10, no. 11, pp. 781-783, 2006.
-
(2006)
IEEE Communications Letters
, vol.10
, Issue.11
, pp. 781-783
-
-
Zhang, X.1
Wang, S.2
|