-
2
-
-
85013855044
-
-
2nd Ed., Morgan Kaufmann, MA
-
I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich and T. Kalker, Digital Watermarking and Steganography, 2nd Ed., Morgan Kaufmann, MA, 2008.
-
(2008)
Digital Watermarking and Steganography
-
-
Cox, I.J.1
Miller, M.L.2
Bloom, J.A.3
Fridrich, J.4
Kalker, T.5
-
3
-
-
0037411306
-
Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy
-
C. C. Chang, J. Y. Hsiao and C. S. Chen, Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy, Pattern Recognition, vol.36, no.7, pp.1583-1595, 2003.
-
(2003)
Pattern Recognition
, vol.36
, Issue.7
, pp. 1583-1595
-
-
Chang, C.C.1
Hsiao, J.Y.2
Chen, C.S.3
-
4
-
-
0346216907
-
Hiding data in images by simple LSB substitution
-
C. K. Chan and L. M. Chen, Hiding data in images by simple LSB substitution, Pattern Recognition, vol.37, no.3, pp.469-474, 2004.
-
(2004)
Pattern Recognition
, vol.37
, Issue.3
, pp. 469-474
-
-
Chan, C.K.1
Chen, L.M.2
-
5
-
-
27144475598
-
Image steganographic scheme based on pixel-value differencing and LSB replacement methods
-
H. C. Wu, N. I. Wu, C. S. Tsai and M. S. Hwang, Image steganographic scheme based on pixel-value differencing and LSB replacement methods, IEE Proc. of the Vision Image Signal Processing, vol.152, no.5, pp.611-615, 2005.
-
(2005)
IEE Proc. of the Vision Image Signal Processing
, vol.152
, Issue.5
, pp. 611-615
-
-
Wu, H.C.1
Wu, N.I.2
Tsai, C.S.3
Hwang, M.S.4
-
6
-
-
33144483650
-
High-payload image steganography using two-way block matching
-
R. Z. Wang and Y. S. Chen, High-payload image steganography using two-way block matching, IEEE Signal Processing Letters, vol.13, no.3, pp.161-164, 2006.
-
(2006)
IEEE Signal Processing Letters
, vol.13
, Issue.3
, pp. 161-164
-
-
Wang, R.Z.1
Chen, Y.S.2
-
7
-
-
48249093845
-
Generalization of pixel-value differencing staganography for data hiding in images
-
J. C. Liu and M. H. Shih, Generalization of pixel-value differencing staganography for data hiding in images, Fundamenta Informaticate, vol.83, no.3, pp.319-335, 2008.
-
(2008)
Fundamenta Informaticate
, vol.83
, Issue.3
, pp. 319-335
-
-
Liu, J.C.1
Shih, M.H.2
-
8
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
I. J. Cox, J. Kilian, F. T. Leighton and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Trans. Image Processing, vol.6, no.12, pp.1673-1687, 1997.
-
(1997)
IEEE Trans. Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
9
-
-
0032785523
-
Hidden digital watermarks in images
-
C. T. Hsu and J. L. Wu, Hidden digital watermarks in images, IEEE Trans. Image Processing, vol.8, no.1, pp.58-68, 1999.
-
(1999)
IEEE Trans. Image Processing
, vol.8
, Issue.1
, pp. 58-68
-
-
Hsu, C.T.1
Wu, J.L.2
-
10
-
-
5644253212
-
Blind image data hiding based on self reference
-
Y. Wang and A. Pearmain, Blind image data hiding based on self reference, Pattern Recognition Letters, vol.25, no.15, pp.1681-1689, 2004.
-
(2004)
Pattern Recognition Letters
, vol.25
, Issue.15
, pp. 1681-1689
-
-
Wang, Y.1
Pearmain, A.2
-
11
-
-
12344318078
-
Image adaptive watermarking using wavelet domain singular value decomposition
-
P. Bao and X. Ma, Image adaptive watermarking using wavelet domain singular value decomposition, IEEE Trans. Circuits and Systems for Video Technology, vol.15, no.1, pp.96-102, 2005.
-
(2005)
IEEE Trans. Circuits and Systems for Video Technology
, vol.15
, Issue.1
, pp. 96-102
-
-
Bao, P.1
Ma, X.2
-
12
-
-
33847687683
-
Adaptive blind wavelet-based watermarking technique using tree mutual difference
-
pp.043011-1-12
-
H. M. Al-Otum and N. A. Samara, Adaptive blind wavelet-based watermarking technique using tree mutual difference, Journal of Electronic Imaging, vol.15, no.4, pp.043011-1-12, 2006.
-
(2006)
Journal of Electronic Imaging
, vol.15
, Issue.4
-
-
Al-Otum, H.M.1
Samara, N.A.2
-
13
-
-
34249908633
-
A new semi-fragile image watermarking with robust tampering restoration using irregular sampling
-
X. Zhu, A. T. S. Ho and P. Marziliano, A new semi-fragile image watermarking with robust tampering restoration using irregular sampling, Signal Processing: Image Communications, vol.22, no.5, pp.515-528, 2007.
-
(2007)
Signal Processing: Image Communications
, vol.22
, Issue.5
, pp. 515-528
-
-
Zhu, X.1
Ho, A.T.S.2
Marziliano, P.3
-
14
-
-
63549090936
-
Multiple watermarking based on visual secret sharing
-
T. H. Chen and T. H. Hung, Multiple watermarking based on visual secret sharing, International Journal of Innovative Computing, Information and Control, vol.4, no.11, pp.3027-3036, 2008.
-
(2008)
International Journal of Innovative Computing, Information and Control
, vol.4
, Issue.11
, pp. 3027-3036
-
-
Chen, T.H.1
Hung, T.H.2
-
15
-
-
33645221486
-
A semi-blind digital watermarking scheme based on singular value decomposition
-
J. M. Shieh, D. C. Lou and M. C. Chang, A semi-blind digital watermarking scheme based on singular value decomposition, Computer Standards & Interfaces, vol.28, no.4, pp.428-440, 2006.
-
(2006)
Computer Standards & Interfaces
, vol.28
, Issue.4
, pp. 428-440
-
-
Shieh, J.M.1
Lou, D.C.2
Chang, M.C.3
-
16
-
-
34249871943
-
Dual-wrapped digital watermarking scheme for image copyright protection
-
M. C. Hu, D. C. Lou and M. C. Chang, Dual-wrapped digital watermarking scheme for image copyright protection, Computers & Security, vol.26, no.4, pp.319-330, 2007.
-
(2007)
Computers & Security
, vol.26
, Issue.4
, pp. 319-330
-
-
Hu, M.C.1
Lou, D.C.2
Chang, M.C.3
-
17
-
-
36749017481
-
A lossless data hiding scheme based on three-pixel difference
-
C. C. Lin and N. L. Hsueh, A lossless data hiding scheme based on three-pixel difference, Pattern Recognition, vol.41, no.4, pp.1415-1425, 2007.
-
(2007)
Pattern Recognition
, vol.41
, Issue.4
, pp. 1415-1425
-
-
Lin, C.C.1
Hsueh, N.L.2
-
18
-
-
48249143445
-
Reversible data hiding schemes for deoxyribonucleic acid (DNA) medium
-
C. C. Chang, T. Lu, Y. F. Chang and C. T. Lee, Reversible data hiding schemes for deoxyribonucleic acid (DNA) medium, International Journal of Innovative Computing, Information and Control, vol.3, no.5, pp.1145-1160, 2007.
-
(2007)
International Journal of Innovative Computing, Information and Control
, vol.3
, Issue.5
, pp. 1145-1160
-
-
Chang, C.C.1
Lu, T.2
Chang, Y.F.3
Lee, C.T.4
-
19
-
-
64349085584
-
Robust lossless image data hiding for semi-fragile image authentication
-
Z. Ni, Y. Q. Shi, N. Ansari, W. Su, Q. Sun and X. Lin, Robust lossless image data hiding for semi-fragile image authentication, IEEE Trans. Circuits and Systems for Video Technology, vol.18, no.4, pp.497-509, 2008.
-
(2008)
IEEE Trans. Circuits and Systems for Video Technology
, vol.18
, Issue.4
, pp. 497-509
-
-
Ni, Z.1
Shi, Y.Q.2
Ansari, N.3
Su, W.4
Sun, Q.5
Lin, X.6
-
20
-
-
63549106032
-
DCT-based zero replacement reversible image watermarking approach
-
C. C. Chen and D. S. Kao, DCT-based zero replacement reversible image watermarking approach, International Journal of Innovative Computing, Information and Control, vol.4, no.11, pp. 3027-3036, 2008.
-
(2008)
International Journal of Innovative Computing, Information and Control
, vol.4
, Issue.11
, pp. 3027-3036
-
-
Chen, C.C.1
Kao, D.S.2
|