-
1
-
-
0036688310
-
A Secure Data Hiding Scheme for Binary Images
-
Y. C. Tseng, Y. Chen, and H. Pan,"A Secure Data Hiding Scheme for Binary Images," IEEE Transactions on Communications, vol. 50, no. 8, pp.1227-31, 2002.
-
(2002)
IEEE Transactions on Communications
, vol.50
, Issue.8
, pp. 1227-1231
-
-
Tseng, Y.C.1
Chen, Y.2
Pan, H.3
-
2
-
-
0036646834
-
Data Hiding in 2-Color Images
-
Y. C. Tseng, and H. Pan,"Data Hiding in 2-Color Images," IEEE Transactions on Computers, vol. 51, no. 7, pp. 873-880, 2002
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.7
, pp. 873-880
-
-
Tseng, Y.C.1
Pan, H.2
-
3
-
-
52449107831
-
An Information Hiding Scheme Using Sudoku
-
C. C. Chang, Y. C. Chou, and The Duc Kieu, "An Information Hiding Scheme Using Sudoku," Proc. of 2008 3rd International Conference on Innovative Computing Information and Control, p. 17, 2008.
-
(2008)
Proc. of 2008 3rd International Conference on Innovative Computing Information and Control
, pp. 17
-
-
Chang, C.C.1
Chou, Y.C.2
Kieu, T.D.3
-
4
-
-
21844470700
-
Writing on Wet Paper
-
Oct.
-
J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal, "Writing on Wet Paper," IEEE Transactions on Signal Processing, Vol. 53, No. 10, Oct. 2005, pp. 3923-3935.
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.10
, pp. 3923-3935
-
-
Fridrich, J.1
Goljan, M.2
Lisonek, P.3
Soukal, D.4
-
5
-
-
0030386584
-
Applications of Toral Automorphisms in Image Watermarking
-
Sep.
-
G. Voyatzis and I. Pitas, "Applications of Toral Automorphisms in Image Watermarking," Proc. of the IEEE International Conference on Image Processing, Lausanne, Switzerland, vol. 2, Sep. 1996, pp. 237-240.
-
(1996)
Proc. of the IEEE International Conference on Image Processing, Lausanne, Switzerland
, vol.2
, pp. 237-240
-
-
Voyatzis, G.1
Pitas, I.2
-
6
-
-
77955219316
-
A Sudoku Based Wet Paper Hiding Scheme
-
A web site
-
The Duc Kieu, Z. H. Wang, C. C. Chang, and M. C. Li, "A Sudoku Based Wet Paper Hiding Scheme," International Journal of Smart Home, vol. 3, no. 2, 2009. A web site: http://www.sersc.org/journals/IJSH/vol3-no2-2009/1.pdf.
-
(2009)
International Journal of Smart Home
, vol.3
, Issue.2
-
-
Kieu, T.D.1
Wang, Z.H.2
Chang, C.C.3
Li, M.C.4
-
7
-
-
70350550201
-
A Data Embedding Scheme Based on a Magic Matrix and Wet Paper Codes
-
C. C. Chang, Y. H. Chen, Z. H. Wang, and M. C. Li, "A Data Embedding Scheme Based on a Magic Matrix and Wet Paper Codes," Proc. of 2009 International Conference on Computational Intelligence and Natural Computing, vol. 2, pp.303-306, 2009.
-
(2009)
Proc. of 2009 International Conference on Computational Intelligence and Natural Computing
, vol.2
, pp. 303-306
-
-
Chang, C.C.1
Chen, Y.H.2
Wang, Z.H.3
Li, M.C.4
-
8
-
-
73849143067
-
Steganography Using Sudoku Puzzle
-
S. B. R. Roshan, J. Rohith, V. Mukund, H. Rohan, and R. Shanta,"Steganography Using Sudoku Puzzle," Proc. of 2009 International Conference on Advances in Recent Technologies in Communication and Computing, 2009.
-
(2009)
Proc. of 2009 International Conference on Advances in Recent Technologies in Communication and Computing
-
-
Roshan, S.B.R.1
Rohith, J.2
Mukund, V.3
Rohan, H.4
Shanta, R.5
-
9
-
-
62949149668
-
Steganography Using Sudoku Revisited
-
W. Hong, T. S. Chen, and C. W. Shiu, "Steganography Using Sudoku Revisited," Proc. of the 2008 Second International Symposium on Intelligent Information Technology, 2008, pp. 935-939.
-
(2008)
Proc. of the 2008 Second International Symposium on Intelligent Information Technology
, pp. 935-939
-
-
Hong, W.1
Chen, T.S.2
Shiu, C.W.3
-
10
-
-
79952097073
-
-
http://www.trump.de/magic-squares/howmany.html
-
-
-
|