-
1
-
-
0032634857
-
Multimedia watermarking techniques
-
Hartung F., Kutter M., Multimedia watermarking techniques Proceedings of the IEEE 1999 87 7 1079 1107
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1079-1107
-
-
Hartung, F.1
Kutter, M.2
-
3
-
-
11844253853
-
Steganography using multiple-base notational system and human vision sensitivity
-
DOI 10.1109/LSP.2004.838214
-
Zhang X., Wang S., Steganography using multiple-base notational system and human vision sensitivity IEEE Signal Processing Letters 2005 12 1 67 70 (Pubitemid 40085284)
-
(2005)
IEEE Signal Processing Letters
, vol.12
, Issue.1
, pp. 67-70
-
-
Zhang, X.1
Wang, S.2
-
4
-
-
1942486241
-
Wavelet tree quantization for copyright protection watermarking
-
Wang S.-H., Lin Y.-P., Wavelet tree quantization for copyright protection watermarking IEEE Transactions on Image Processing 2004 13 2 154 165
-
(2004)
IEEE Transactions on Image Processing
, vol.13
, Issue.2
, pp. 154-165
-
-
Wang, S.-H.1
Lin, Y.-P.2
-
5
-
-
0036329257
-
Steganographic method for secure communications
-
DOI 10.1016/S0167-4048(02)00515-1
-
Lou D.-C., Liu J.-L., Steganographic method for secure communications Computers and Security 2002 21 5 449 460 (Pubitemid 34835645)
-
(2002)
Computers and Security
, vol.21
, Issue.5
, pp. 449-460
-
-
Lou, D.-C.1
Liu, J.-L.2
-
6
-
-
25144448272
-
A hierarchical digital watermarking method for image tamper detection and recovery
-
DOI 10.1016/j.patcog.2005.02.007, PII S0031320305000890
-
Lin P. L., Hsieh C.-K., Huang P.-W., A hierarchical digital watermarking method for image tamper detection and recovery Pattern Recognition 2005 38 12 2519 2529 (Pubitemid 41336720)
-
(2005)
Pattern Recognition
, vol.38
, Issue.12
, pp. 2519-2529
-
-
Lin, P.L.1
Hsieh, C.-K.2
Huang, P.-W.3
-
7
-
-
0035473831
-
Secret and public key image watermarking schemes for image authentication and ownership verification
-
DOI 10.1109/83.951543, PII S1057714901082094
-
Wong P. W., Memon N., Secret and public key image watermarking schemes for image authentication and ownership verification IEEE Transactions on Image Processing 2001 10 10 1593 1601 (Pubitemid 32981831)
-
(2001)
IEEE Transactions on Image Processing
, vol.10
, Issue.10
, pp. 1593-1601
-
-
Wong, P.W.1
Memon, N.2
-
8
-
-
0346216907
-
Hiding data in images by simple LSB substitution
-
DOI 10.1016/j.patcog.2003.08.007
-
Chan C.-K., Cheng L. M., Hiding data in images by simple LSB substitution Pattern Recognition 2004 37 3 469 474 (Pubitemid 38003086)
-
(2004)
Pattern Recognition
, vol.37
, Issue.3
, pp. 469-474
-
-
Chan, C.-K.1
Cheng, L.M.2
-
9
-
-
0036688310
-
A secure data hiding scheme for binary images
-
DOI 10.1109/TCOMM.2002.801488, PII 1011092002801488
-
Tseng Y.-C., Chen Y.-Y., Pan H.-K., A secure data hiding scheme for binary images IEEE Transactions on Communications 2002 50 8 1227 1231 (Pubitemid 34974148)
-
(2002)
IEEE Transactions on Communications
, vol.50
, Issue.8
, pp. 1227-1231
-
-
Tseng, Y.-C.1
Chen, Y.-Y.2
Pan, H.-K.3
-
10
-
-
84937814312
-
-
Proceedings of the 4th International Workshop on Information Hiding (IH 01) April 2001 Pittsburgh, Pa, USA Lecture Notes in Computer Science
-
Westfeld A., F5a steganographic algorithm 2137 Proceedings of the 4th International Workshop on Information Hiding (IH 01) April 2001 Pittsburgh, Pa, USA 289 302 Lecture Notes in Computer Science
-
F5a steganographic algorithm
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
11
-
-
0037410595
-
A steganographic method for images by pixel-value differencing
-
DOI 10.1016/S0167-8655(02)00402-6
-
Wu D.-C., Tsai W.-H., A steganographic method for images by pixel-value differencing Pattern Recognition Letters 2003 24 9-10 1613 1626 (Pubitemid 36230215)
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.9-10
, pp. 1613-1626
-
-
Wu, D.-C.1
Tsai, W.-H.2
-
12
-
-
35848929919
-
A high quality steganographic method with pixel-value differencing and modulus function
-
DOI 10.1016/j.jss.2007.01.049, PII S0164121207000593
-
Wang C.-M., Wu N.-I., Tsai C.-S., Hwang M.-S., A high quality steganographic method with pixel-value differencing and modulus function The Journal of Systems and Software 2008 81 1 150 158 (Pubitemid 350060985)
-
(2008)
Journal of Systems and Software
, vol.81
, Issue.1
, pp. 150-158
-
-
Wang, C.-M.1
Wu, N.-I.2
Tsai, C.-S.3
Hwang, M.-S.4
-
13
-
-
47349094397
-
Efficient steganographic embedding by exploiting modification direction
-
Zhang X., Wang S., Efficient steganographic embedding by exploiting modification direction IEEE Communications Letters 2006 10 11 781 783
-
(2006)
IEEE Communications Letters
, vol.10
, Issue.11
, pp. 781-783
-
-
Zhang, X.1
Wang, S.2
-
15
-
-
0347355319
-
Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security
-
DOI 10.1016/j.patrec.2003.10.014
-
Zhang X., Wang S., Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security Pattern Recognition Letters 2004 25 3 331 339 (Pubitemid 38062594)
-
(2004)
Pattern Recognition Letters
, vol.25
, Issue.3
, pp. 331-339
-
-
Zhang, X.1
Wang, S.2
-
17
-
-
0041308536
-
-
Proceedings of the 5th International Workshop on Information Hiding (IH 02) October 2002 Noordwijkerhout, The Netherlands Lecture Notes in Computer Science
-
Lyu S., Farid H., Detecting hidden messages using higher-order statistics and support vector machines 2578 Proceedings of the 5th International Workshop on Information Hiding (IH 02) October 2002 Noordwijkerhout, The Netherlands 340 354 Lecture Notes in Computer Science
-
Detecting hidden messages using higher-order statistics and support vector machines
, vol.2578
, pp. 340-354
-
-
Lyu, S.1
Farid, H.2
|