-
1
-
-
0032680807
-
Information Hiding-A Survey
-
F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, Information Hiding-A Survey, Proceedings of the IEEE, special issue on protection of multimedia content, vol. 87, no. 7, pp. 1062-1078, 1999.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
2
-
-
33645157142
-
Reversible Data Hiding
-
Z. Ni, Y.Q. Shi, N. Ansari and W. Su, Reversible Data Hiding, IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362, 2006.
-
(2006)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.16
, Issue.3
, pp. 354-362
-
-
Ni, Z.1
Shi, Y.Q.2
Ansari, N.3
Su, W.4
-
3
-
-
13244269881
-
Lossless Generalized-LSB Data Embedding
-
M.U. Celik, G. Sharma, A.M. Tekalp and E. Saber, Lossless Generalized-LSB Data Embedding, IEEE Transactions on Image Processing, vol. 14, no. 2, pp. 253-266, 2005.
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.2
, pp. 253-266
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
Saber, E.4
-
4
-
-
0034249378
-
A Robust DCT-based Watermarking for Copyright Protection
-
S.D. Lin and C.F. Chen, A Robust DCT-based Watermarking for Copyright Protection, IEEE Transactions on Consumer Electron, vol. 46, no. 3, pp. 415-421, 2000.
-
(2000)
IEEE Transactions on Consumer Electron
, vol.46
, Issue.3
, pp. 415-421
-
-
Lin, S.D.1
Chen, C.F.2
-
5
-
-
31744433507
-
Genetic algorithm based methodology for breaking the steganalytic systems
-
Y.T. Wu and F.Y. Shih, Genetic algorithm based methodology for breaking the steganalytic systems, IEEE Transactions on Systems, Man and Cybernetics. Part B, vol. 36, no. 1, pp. 24-31, 2006.
-
(2006)
IEEE Transactions on Systems, Man and Cybernetics. Part B
, vol.36
, Issue.1
, pp. 24-31
-
-
Wu, Y.T.1
Shih, F.Y.2
-
6
-
-
33845650617
-
Reversible Steganography for VQ-compressed Images Using Side Matching and Relocation
-
C. C. Chang, and C. Y. Lin, Reversible Steganography for VQ-compressed Images Using Side Matching and Relocation, IEEE Transactions on Information Forensics and Security, vol. 1, no. 4, pp. 493-501, 2006.
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.4
, pp. 493-501
-
-
Chang, C.C.1
Lin, C.Y.2
-
7
-
-
52049115655
-
Reversible Data Hiding in the VQ-Compressed Domain
-
C. C. Chang, Y. C. Chou and C. Y. Lin, Reversible Data Hiding in the VQ-Compressed Domain, IEICE Transactions on Information and Systems, vol. E90-D no. 9, pp. 1422-1429, 2007.
-
(2007)
IEICE Transactions on Information and Systems
, vol.E90-D
, Issue.9
, pp. 1422-1429
-
-
Chang, C.C.1
Chou, Y.C.2
Lin, C.Y.3
-
8
-
-
0035283377
-
-
R.Z. Wang, C.F. Lin and J.C. Lin, Image Hiding by Optimal LSB Substitution and Genetic Algorithm, vol. 34, no. 3, pp. 671-683, 2001.
-
(2001)
Image Hiding by Optimal LSB Substitution and Genetic Algorithm
, vol.34
, Issue.3
, pp. 671-683
-
-
Wang, R.Z.1
Lin, C.F.2
Lin, J.C.3
-
9
-
-
33645814428
-
LSB Matching Revisited
-
J. Mielikainen, LSB Matching Revisited, IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, 2006.
-
(2006)
IEEE Signal Processing Letters
, vol.13
, Issue.5
, pp. 285-287
-
-
Mielikainen, J.1
-
10
-
-
47349094397
-
Efficient Steganographic Embedding by Exploiting Modification Direction
-
X. Zhang and S. Wang, Efficient Steganographic Embedding by Exploiting Modification Direction, IEEE Communications Letters, vol. 10, no. 11, pp. 781-783, 2006.
-
(2006)
IEEE Communications Letters
, vol.10
, Issue.11
, pp. 781-783
-
-
Zhang, X.1
Wang, S.2
-
12
-
-
37349036420
-
-
B. Felgenhauer and F. Jarvis. Mathematics of Sudoku I, Mathematical Spectrum, vol. 39, no. 1, pp. 15-22, 2006.
-
(2006)
Mathematics of Sudoku I, Mathematical Spectrum
, vol.39
, Issue.1
, pp. 15-22
-
-
Felgenhauer, B.1
Jarvis, F.2
|