메뉴 건너뛰기




Volumn 2, Issue , 2008, Pages 935-939

Steganography using sudoku revisited

Author keywords

Data hiding; Steganography; Sudoku

Indexed keywords

DATA EMBEDDING; DATA HIDING; EMBEDDING CAPACITIES; IMAGE DISTORTIONS; INFORMATION HIDINGS; PIXEL VALUES; REFERENCE MATRIXES; SECRET MESSAGES; STEGANOGRAPHY; STEGO IMAGES; SUDOKU; VISUAL QUALITIES; WANG'S METHODS;

EID: 62949149668     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IITA.2008.445     Document Type: Conference Paper
Times cited : (13)

References (12)
  • 1
    • 0032680807 scopus 로고    scopus 로고
    • Information Hiding-A Survey
    • F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, Information Hiding-A Survey, Proceedings of the IEEE, special issue on protection of multimedia content, vol. 87, no. 7, pp. 1062-1078, 1999.
    • (1999) Proceedings of the IEEE , vol.87 , Issue.7 , pp. 1062-1078
    • Petitcolas, F.A.P.1    Anderson, R.J.2    Kuhn, M.G.3
  • 4
    • 0034249378 scopus 로고    scopus 로고
    • A Robust DCT-based Watermarking for Copyright Protection
    • S.D. Lin and C.F. Chen, A Robust DCT-based Watermarking for Copyright Protection, IEEE Transactions on Consumer Electron, vol. 46, no. 3, pp. 415-421, 2000.
    • (2000) IEEE Transactions on Consumer Electron , vol.46 , Issue.3 , pp. 415-421
    • Lin, S.D.1    Chen, C.F.2
  • 5
    • 31744433507 scopus 로고    scopus 로고
    • Genetic algorithm based methodology for breaking the steganalytic systems
    • Y.T. Wu and F.Y. Shih, Genetic algorithm based methodology for breaking the steganalytic systems, IEEE Transactions on Systems, Man and Cybernetics. Part B, vol. 36, no. 1, pp. 24-31, 2006.
    • (2006) IEEE Transactions on Systems, Man and Cybernetics. Part B , vol.36 , Issue.1 , pp. 24-31
    • Wu, Y.T.1    Shih, F.Y.2
  • 6
    • 33845650617 scopus 로고    scopus 로고
    • Reversible Steganography for VQ-compressed Images Using Side Matching and Relocation
    • C. C. Chang, and C. Y. Lin, Reversible Steganography for VQ-compressed Images Using Side Matching and Relocation, IEEE Transactions on Information Forensics and Security, vol. 1, no. 4, pp. 493-501, 2006.
    • (2006) IEEE Transactions on Information Forensics and Security , vol.1 , Issue.4 , pp. 493-501
    • Chang, C.C.1    Lin, C.Y.2
  • 10
    • 47349094397 scopus 로고    scopus 로고
    • Efficient Steganographic Embedding by Exploiting Modification Direction
    • X. Zhang and S. Wang, Efficient Steganographic Embedding by Exploiting Modification Direction, IEEE Communications Letters, vol. 10, no. 11, pp. 781-783, 2006.
    • (2006) IEEE Communications Letters , vol.10 , Issue.11 , pp. 781-783
    • Zhang, X.1    Wang, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.