-
1
-
-
3843102623
-
Reversible watermark using the difference expansion of a generalized integer transform
-
A.M. Alattar, "Reversible watermark using the difference expansion of a generalized integer transform," IEEE Trans. Image Process., vol.13, no.8, pp.1147-1156, 2004.
-
(2004)
IEEE Trans. Image Process
, vol.13
, Issue.8
, pp. 1147-1156
-
-
Alattar, A.M.1
-
2
-
-
1642302769
-
Reversible data hiding
-
Rochester, NY
-
M.U. Celik,G. Sharma, A.M.Tekalp, and E. Saber, "Reversible data hiding," Proc. IEEE International Conference on Image Processing, pp.157-160, Rochester, NY, 2002.
-
(2002)
Proc. IEEE International Conference on Image Processing
, pp. 157-160
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
Saber, E.4
-
3
-
-
0036497685
-
A steganographic method based upon JPEG and quantization table modification
-
C.C. Chang, T.S. Chen, and L.Z. Chung, "A steganographic method based upon JPEG and quantization table modification," Inf. Sci., vol.141, no.1, pp.123-138, 2002.
-
(2002)
Inf. Sci
, vol.141
, Issue.1
, pp. 123-138
-
-
Chang, C.C.1
Chen, T.S.2
Chung, L.Z.3
-
4
-
-
0037411306
-
Finding optimal LSB substitution in image hiding by dynamic programming strategy
-
C.C. Chang, J.Y. Hsiao, and C.S. Chan, "Finding optimal LSB substitution in image hiding by dynamic programming strategy," Pattern Recognit., vol.36, no.7, pp.1583-1595, 2003.
-
(2003)
Pattern Recognit
, vol.36
, Issue.7
, pp. 1583-1595
-
-
Chang, C.C.1
Hsiao, J.Y.2
Chan, C.S.3
-
5
-
-
33845650617
-
Reversible steganography for VQcompressed images using side matching and relocation
-
C.C. Chang and C.Y. Lin, "Reversible steganography for VQcompressed images using side matching and relocation," IEEE Trans. Inf. Forensics and Security, vol.1, no.4, pp.493-501, 2006.
-
(2006)
IEEE Trans. Inf. Forensics and Security
, vol.1
, Issue.4
, pp. 493-501
-
-
Chang, C.C.1
Lin, C.Y.2
-
6
-
-
33751501445
-
A reversible data hiding scheme based on side match vector quantization
-
C.C. Chang, W.L. Tai, and C.C. Lin, "A reversible data hiding scheme based on side match vector quantization," IEEE Trans. Circuits Syst. Video Technol., vol.16, no.10, pp.1301-1308, 2006.
-
(2006)
IEEE Trans. Circuits Syst. Video Technol
, vol.16
, Issue.10
, pp. 1301-1308
-
-
Chang, C.C.1
Tai, W.L.2
Lin, C.C.3
-
7
-
-
0141954068
-
Adaptive data hiding based on VQ compressed images
-
W.C. Du and W.J. Hsu, "Adaptive data hiding based on VQ compressed images," IEE Proc.-Vision, Image and Signal Processing, vol.150, no.4, pp.233-238, 2003.
-
(2003)
IEE Proc.-Vision, Image and Signal Processing
, vol.150
, Issue.4
, pp. 233-238
-
-
Du, W.C.1
Hsu, W.J.2
-
8
-
-
84961844573
-
Invertible authentication watermark for JPEG images
-
Las Vegas, NV
-
J. Fridrich, M. Goljan, and R. Du, "Invertible authentication watermark for JPEG images," Proc. IEEE International Conference on Information Technology: Coding and Computing, pp.223-227, Las Vegas, NV, 2001.
-
(2001)
Proc. IEEE International Conference on Information Technology: Coding and Computing
, pp. 223-227
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
9
-
-
0036488240
-
Lossless data embedding-new paradigm in digital watermarking
-
J. Fridrich, M. Goljan, and R. Du, "Lossless data embedding-new paradigm in digital watermarking," EURASIP Journal on Applied Signal Processing, vol.2002, no.2, pp.185-196, 2002.
-
(2002)
EURASIP Journal on Applied Signal Processing
, vol.2002
, Issue.2
, pp. 185-196
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
10
-
-
2342464968
-
Digital steganography utilizing features of JPEG images
-
April
-
M. Iwata, K. Miyake, and A. Shiozaki, "Digital steganography utilizing features of JPEG images," IEICE Trans. Fundamentals, vol.E87-A, no.4, pp.929-936, April 2004.
-
(2004)
IEICE Trans. Fundamentals
, vol.E87-A
, Issue.4
, pp. 929-936
-
-
Iwata, M.1
Miyake, K.2
Shiozaki, A.3
-
12
-
-
0141862029
-
Reversible data embedding using a difference expansion
-
J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. Circuits Syst. Video Technol., vol.13, no.8, pp.890- 896, 2003.
-
(2003)
IEEE Trans. Circuits Syst. Video Technol
, vol.13
, Issue.8
, pp. 890-896
-
-
Tian, J.1
-
13
-
-
0038273964
-
Circular interpretation of bijective transformations in lossless watermarking for media asset management
-
C.D. Vleeschouwer, J.F. Delaigle, and B. Macq, "Circular interpretation of bijective transformations in lossless watermarking for media asset management," IEEE Trans. Multimed., vol.5, no.1, pp.97- 105, 2003.
-
(2003)
IEEE Trans. Multimed
, vol.5
, Issue.1
, pp. 97-105
-
-
Vleeschouwer, C.D.1
Delaigle, J.F.2
Macq, B.3
-
14
-
-
0037410595
-
A steganographic method for Images by pixel-value differencing
-
D.C. Wu and W.H. Tsai, "A steganographic method for Images by pixel-value differencing," Pattern Recognit. Letters, vol.24, no.9-10, pp.1613-1626, 2003.
-
(2003)
Pattern Recognit. Letters
, vol.24
, Issue.9-10
, pp. 1613-1626
-
-
Wu, D.C.1
Tsai, W.H.2
-
15
-
-
13644262818
-
Hiding secret data in images via predictive coding
-
Y.H. Yu, C.C. Chang, and Y.C. Hu, "Hiding secret data in images via predictive coding," Pattern Recognit., vol.38, no.5, pp.691-705, 2005.
-
(2005)
Pattern Recognit
, vol.38
, Issue.5
, pp. 691-705
-
-
Yu, Y.H.1
Chang, C.C.2
Hu, Y.C.3
|