메뉴 건너뛰기




Volumn 2009, Issue , 2009, Pages

A novel image data hiding scheme with diamond encoding

Author keywords

[No Author keywords available]

Indexed keywords


EID: 67650187752     PISSN: 16874161     EISSN: 2510523X     Source Type: Journal    
DOI: 10.1155/2009/658047     Document Type: Article
Times cited : (132)

References (18)
  • 1
    • 0032634857 scopus 로고    scopus 로고
    • Multimedia watermarking techniques
    • Hartung F., Kutter M., Multimedia watermarking techniques Proceedings of the IEEE 1999 87 7 1079 1107
    • (1999) Proceedings of the IEEE , vol.87 , Issue.7 , pp. 1079-1107
    • Hartung, F.1    Kutter, M.2
  • 3
    • 11844253853 scopus 로고    scopus 로고
    • Steganography using multiple-base notational system and human vision sensitivity
    • DOI 10.1109/LSP.2004.838214
    • Zhang X., Wang S., Steganography using multiple-base notational system and human vision sensitivity IEEE Signal Processing Letters 2005 12 1 67 70 (Pubitemid 40085284)
    • (2005) IEEE Signal Processing Letters , vol.12 , Issue.1 , pp. 67-70
    • Zhang, X.1    Wang, S.2
  • 4
    • 1942486241 scopus 로고    scopus 로고
    • Wavelet tree quantization for copyright protection watermarking
    • Wang S.-H., Lin Y.-P., Wavelet tree quantization for copyright protection watermarking IEEE Transactions on Image Processing 2004 13 2 154 165
    • (2004) IEEE Transactions on Image Processing , vol.13 , Issue.2 , pp. 154-165
    • Wang, S.-H.1    Lin, Y.-P.2
  • 5
    • 0036329257 scopus 로고    scopus 로고
    • Steganographic method for secure communications
    • DOI 10.1016/S0167-4048(02)00515-1
    • Lou D.-C., Liu J.-L., Steganographic method for secure communications Computers and Security 2002 21 5 449 460 (Pubitemid 34835645)
    • (2002) Computers and Security , vol.21 , Issue.5 , pp. 449-460
    • Lou, D.-C.1    Liu, J.-L.2
  • 6
    • 25144448272 scopus 로고    scopus 로고
    • A hierarchical digital watermarking method for image tamper detection and recovery
    • DOI 10.1016/j.patcog.2005.02.007, PII S0031320305000890
    • Lin P. L., Hsieh C.-K., Huang P.-W., A hierarchical digital watermarking method for image tamper detection and recovery Pattern Recognition 2005 38 12 2519 2529 (Pubitemid 41336720)
    • (2005) Pattern Recognition , vol.38 , Issue.12 , pp. 2519-2529
    • Lin, P.L.1    Hsieh, C.-K.2    Huang, P.-W.3
  • 7
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • DOI 10.1109/83.951543, PII S1057714901082094
    • Wong P. W., Memon N., Secret and public key image watermarking schemes for image authentication and ownership verification IEEE Transactions on Image Processing 2001 10 10 1593 1601 (Pubitemid 32981831)
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2
  • 8
    • 0346216907 scopus 로고    scopus 로고
    • Hiding data in images by simple LSB substitution
    • DOI 10.1016/j.patcog.2003.08.007
    • Chan C.-K., Cheng L. M., Hiding data in images by simple LSB substitution Pattern Recognition 2004 37 3 469 474 (Pubitemid 38003086)
    • (2004) Pattern Recognition , vol.37 , Issue.3 , pp. 469-474
    • Chan, C.-K.1    Cheng, L.M.2
  • 9
    • 0036688310 scopus 로고    scopus 로고
    • A secure data hiding scheme for binary images
    • DOI 10.1109/TCOMM.2002.801488, PII 1011092002801488
    • Tseng Y.-C., Chen Y.-Y., Pan H.-K., A secure data hiding scheme for binary images IEEE Transactions on Communications 2002 50 8 1227 1231 (Pubitemid 34974148)
    • (2002) IEEE Transactions on Communications , vol.50 , Issue.8 , pp. 1227-1231
    • Tseng, Y.-C.1    Chen, Y.-Y.2    Pan, H.-K.3
  • 10
    • 84937814312 scopus 로고    scopus 로고
    • Proceedings of the 4th International Workshop on Information Hiding (IH 01) April 2001 Pittsburgh, Pa, USA Lecture Notes in Computer Science
    • Westfeld A., F5a steganographic algorithm 2137 Proceedings of the 4th International Workshop on Information Hiding (IH 01) April 2001 Pittsburgh, Pa, USA 289 302 Lecture Notes in Computer Science
    • F5a steganographic algorithm , vol.2137 , pp. 289-302
    • Westfeld, A.1
  • 11
    • 0037410595 scopus 로고    scopus 로고
    • A steganographic method for images by pixel-value differencing
    • DOI 10.1016/S0167-8655(02)00402-6
    • Wu D.-C., Tsai W.-H., A steganographic method for images by pixel-value differencing Pattern Recognition Letters 2003 24 9-10 1613 1626 (Pubitemid 36230215)
    • (2003) Pattern Recognition Letters , vol.24 , Issue.9-10 , pp. 1613-1626
    • Wu, D.-C.1    Tsai, W.-H.2
  • 12
    • 35848929919 scopus 로고    scopus 로고
    • A high quality steganographic method with pixel-value differencing and modulus function
    • DOI 10.1016/j.jss.2007.01.049, PII S0164121207000593
    • Wang C.-M., Wu N.-I., Tsai C.-S., Hwang M.-S., A high quality steganographic method with pixel-value differencing and modulus function The Journal of Systems and Software 2008 81 1 150 158 (Pubitemid 350060985)
    • (2008) Journal of Systems and Software , vol.81 , Issue.1 , pp. 150-158
    • Wang, C.-M.1    Wu, N.-I.2    Tsai, C.-S.3    Hwang, M.-S.4
  • 13
    • 47349094397 scopus 로고    scopus 로고
    • Efficient steganographic embedding by exploiting modification direction
    • Zhang X., Wang S., Efficient steganographic embedding by exploiting modification direction IEEE Communications Letters 2006 10 11 781 783
    • (2006) IEEE Communications Letters , vol.10 , Issue.11 , pp. 781-783
    • Zhang, X.1    Wang, S.2
  • 15
    • 0347355319 scopus 로고    scopus 로고
    • Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security
    • DOI 10.1016/j.patrec.2003.10.014
    • Zhang X., Wang S., Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security Pattern Recognition Letters 2004 25 3 331 339 (Pubitemid 38062594)
    • (2004) Pattern Recognition Letters , vol.25 , Issue.3 , pp. 331-339
    • Zhang, X.1    Wang, S.2
  • 17
    • 0041308536 scopus 로고    scopus 로고
    • Proceedings of the 5th International Workshop on Information Hiding (IH 02) October 2002 Noordwijkerhout, The Netherlands Lecture Notes in Computer Science
    • Lyu S., Farid H., Detecting hidden messages using higher-order statistics and support vector machines 2578 Proceedings of the 5th International Workshop on Information Hiding (IH 02) October 2002 Noordwijkerhout, The Netherlands 340 354 Lecture Notes in Computer Science
    • Detecting hidden messages using higher-order statistics and support vector machines , vol.2578 , pp. 340-354
    • Lyu, S.1    Farid, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.