-
1
-
-
13244269881
-
Lossless Generalized-LSB Data Embedding
-
Feb
-
M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, "Lossless Generalized-LSB Data Embedding," IEEE Transactions on Image Processing, Vol. 14, No. 2, Feb. 2005, pp. 253-266.
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.2
, pp. 253-266
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
Saber, E.4
-
2
-
-
34247156504
-
Reversible hiding in DCT-based compressed images
-
July
-
Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai, "Reversible hiding in DCT-based compressed images," Information Sciences, Vol. 177, Issue 13, July 2007, pp. 2768-2786.
-
(2007)
Information Sciences
, vol.177
, Issue.13
, pp. 2768-2786
-
-
Chang, C.-C.1
Lin, C.-C.2
Tseng, C.-S.3
Tai, W.-L.4
-
3
-
-
0036497685
-
A Steganographic Method Based upon JPEG and Quantization Table Modification
-
C. C. Chang, T. S. Chen and L. Z. Chung, "A Steganographic Method Based upon JPEG and Quantization Table Modification," Information Sciences, Vol. 141, 2002, pp. 123-138.
-
(2002)
Information Sciences
, vol.141
, pp. 123-138
-
-
Chang, C.C.1
Chen, T.S.2
Chung, L.Z.3
-
4
-
-
0037411306
-
Finding Optimal Least-Significant-Bit Substitution in Image Hiding by Dynamic Programming Strategy
-
July
-
C. C. Chang, J. Y. Hsiao, and C. S. Chan. "Finding Optimal Least-Significant-Bit Substitution in Image Hiding by Dynamic Programming Strategy," Pattern Recognition, Vol. 36, No. 7, July 2003, pp. 1595-1683.
-
(2003)
Pattern Recognition
, vol.36
, Issue.7
, pp. 1595-1683
-
-
Chang, C.C.1
Hsiao, J.Y.2
Chan, C.S.3
-
5
-
-
33751501445
-
A Reversible Data Hiding Scheme Based on Side Match Vector Quantization
-
C. C. Chang, W. L. Tai, and C. C. Lin, "A Reversible Data Hiding Scheme Based on Side Match Vector Quantization," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, No. 10, pp. 1301-1308, 2006.
-
(2006)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.16
, Issue.10
, pp. 1301-1308
-
-
Chang, C.C.1
Tai, W.L.2
Lin, C.C.3
-
6
-
-
0035397229
-
A Novel SVD-and VQ-based Image Hiding Scheme
-
K. L. Chung, C. H. Shen and L. C. Chang, "A Novel SVD-and VQ-based Image Hiding Scheme," Pattern Recognition Letters, Vol. 22, No. 9, 2001, pp. 1051-1058.
-
(2001)
Pattern Recognition Letters
, vol.22
, Issue.9
, pp. 1051-1058
-
-
Chung, K.L.1
Shen, C.H.2
Chang, L.C.3
-
7
-
-
34249085398
-
Image Data Compression: Block Truncation Coding
-
Los Alamitos, CA
-
B. V. Dasarathy, "Image Data Compression: Block Truncation Coding," IEEE Computer Society Press, Los Alamitos, CA, 1995, pp. 164-173.
-
(1995)
IEEE Computer Society Press
, pp. 164-173
-
-
Dasarathy, B.V.1
-
8
-
-
0017501281
-
Exhaustive Cryptanalysis of the NBS Data Encryption Standard
-
W. Diffie and M. E. Hellman, "Exhaustive Cryptanalysis of the NBS Data Encryption Standard," IEEE Computer, Vol. 10, 1977, pp. 74-84.
-
(1977)
IEEE Computer
, vol.10
, pp. 74-84
-
-
Diffie, W.1
Hellman, M.E.2
-
9
-
-
84961844573
-
Invertible Authentication Watermark for JPEG Images
-
Las Vegas, Nevada, April 2-4
-
J. Fridrich, M. Goljanb, R. Du, "Invertible Authentication Watermark for JPEG Images," IEEE Int. Conf. Information Technology: Coding and Computing, Las Vegas, Nevada, April 2-4, 2001, pp. 223-227.
-
(2001)
IEEE Int. Conf. Information Technology: Coding and Computing
, pp. 223-227
-
-
Fridrich, J.1
Goljanb, M.2
Du, R.3
-
11
-
-
2342464968
-
Digital Steganography Utilizing Features of JPEG Images
-
April
-
M. Iwata, K Miyake, and A. Shiozaki, "Digital Steganography Utilizing Features of JPEG Images," IEICE Transactions on Fundamentals, Vol. E87-A, No. 4, April 2004, pp. 929-936.
-
(2004)
IEICE Transactions on Fundamentals
, vol.E87-A
, Issue.4
, pp. 929-936
-
-
Iwata, M.1
Miyake, K.2
Shiozaki, A.3
-
12
-
-
0001310847
-
A Method of Embedding Binary Data into JPEG Bitstreams
-
H. Kobayashi, Y. Noguchi and H. Kiya, "A Method of Embedding Binary Data into JPEG Bitstreams," IEICE Transactions on Fundamentals, J83-D2, Vol. 6, 2000, pp. 1469-1476.
-
(2000)
IEICE Transactions on Fundamentals
, vol.6
-
-
Kobayashi, H.1
Noguchi, Y.2
Kiya, H.3
-
13
-
-
0033716537
-
High Capacity Image Steganographic Model
-
Y. K. Lee and L. H. Chen, "High Capacity Image Steganographic Model," Proc. of IEE International Conference on Vision, Image and Signal Processing, Vol. 147, No. 3, 2000, pp. 288-294.
-
(2000)
Proc. of IEE International Conference on Vision, Image and Signal Processing
, vol.147
, Issue.3
, pp. 288-294
-
-
Lee, Y.K.1
Chen, L.H.2
-
14
-
-
0038421787
-
-
Z. Ni, Y.Q. Shi, N. Ansari, W. Su, Reversible Data Hiding, Proc.s of the 2003 International Symposium on Circuits and Systems (ISCAS '03), 2, May 2003, pp. II-912-II-915.
-
Z. Ni, Y.Q. Shi, N. Ansari, W. Su, "Reversible Data Hiding," Proc.s of the 2003 International Symposium on Circuits and Systems (ISCAS '03), Vol. 2, May 2003, pp. II-912-II-915.
-
-
-
-
15
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-key Cryptosystem
-
Feb
-
R.L. Rivest, A. Shamir, L. Adelman, "A Method for Obtaining Digital Signatures and Public-key Cryptosystem," Communications of the ACM, Vol. 21, No. 2, Feb. 1978, pp. 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adelman, L.3
-
17
-
-
0842283612
-
An Image Hiding Technique Using Block Truncation Coding
-
Kitakyushu, Japan, July
-
P. Tsai, Y. C. Hu and C. C. Chang, "An Image Hiding Technique Using Block Truncation Coding," Proc. of Pacific Rim Workshop on Digital Steganography, Kitakyushu, Japan, July 2002, pp. 54-64.
-
(2002)
Proc. of Pacific Rim Workshop on Digital Steganography
, pp. 54-64
-
-
Tsai, P.1
Hu, Y.C.2
Chang, C.C.3
-
18
-
-
0035283377
-
Image Hiding by Optimal LSB Substitution and Genetic Algorithm
-
R. Z. Wang, C. F. Lin and J. C. Lin, "Image Hiding by Optimal LSB Substitution and Genetic Algorithm," Pattern Recognition, Vol. 34, No. 3, 2001, pp. 671-683.
-
(2001)
Pattern Recognition
, vol.34
, Issue.3
, pp. 671-683
-
-
Wang, R.Z.1
Lin, C.F.2
Lin, J.C.3
-
19
-
-
0037028254
-
Distortionless Data Hiding Based on Integer Wavelet Transform
-
December
-
G. Xuan, J. Zhu, J. Chen, Y.-Q. Shi, Z. Ni, and W. Su, "Distortionless Data Hiding Based on Integer Wavelet Transform," IEE Electronics Letters, vol. 38, no. 25, December 2002, pp. 1646-1648.
-
(2002)
IEE Electronics Letters
, vol.38
, Issue.25
, pp. 1646-1648
-
-
Xuan, G.1
Zhu, J.2
Chen, J.3
Shi, Y.-Q.4
Ni, Z.5
Su, W.6
|