-
1
-
-
33847656645
-
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata
-
DOI 10.1016/j.jss.2006.07.006, PII S0164121206001981
-
A. Castiglione, A. De Santis, and C. Soriente Taking advantages of a disadvantage: digital forensics and steganography using document metadata Journal of Systems and Software 80 5 2007 750 764 (Pubitemid 46367885)
-
(2007)
Journal of Systems and Software
, vol.80
, Issue.5
, pp. 750-764
-
-
Castiglione, A.1
De Santis, A.2
Soriente, C.3
-
3
-
-
0346216907
-
Hiding data in images by simple LSB substitution
-
DOI 10.1016/j.patcog.2003.08.007
-
C.-K. Chan, and L.M. Cheng Hiding data in images by simple LSB substitution Pattern Recognition 37 3 2004 469 474 (Pubitemid 38003086)
-
(2004)
Pattern Recognition
, vol.37
, Issue.3
, pp. 469-474
-
-
Chan, C.-K.1
Cheng, L.M.2
-
4
-
-
33646519145
-
A new multi-stage secret sharing scheme using one-way function
-
DOI 10.1145/1044552.1044557
-
T.-Y. Chang, M.-S. Hwang, and W.-P. Wang A new multi-stage secret sharing scheme using one-way function ACM SIGOPS Operating Systems Review 39 1 2005 48 55 (Pubitemid 44849610)
-
(2005)
Operating Systems Review (ACM)
, vol.39
, Issue.1
, pp. 48-55
-
-
Chang, T.-Y.1
Hwang, M.-S.2
Yang, W.-P.3
-
5
-
-
45549098627
-
Sharing secrets in stego images with authentication
-
C.-C. Chang, Y.-P. Hsieh, and C.-H. Lin Sharing secrets in stego images with authentication Pattern Recognition 41 10 2008 3130 3137
-
(2008)
Pattern Recognition
, vol.41
, Issue.10
, pp. 3130-3137
-
-
Chang, C.-C.1
Hsieh, Y.-P.2
Lin, C.-H.3
-
6
-
-
79960457002
-
A secure fragile watermarking scheme based on chaos-and-hamming code
-
doi:10.1016/j.jss.2011.02.029 in press, Corrected Proof, Available online 21 March, ISSN 0164-1212
-
Chang, C.-C.; Chen, K.-N.; Lee, C.-F.; Liu, L.-J.; A secure fragile watermarking scheme based on chaos-and-hamming code, Journal of Systems and Software, in press, Corrected Proof, Available online 21 March 2011, ISSN 0164-1212, doi:10.1016/j.jss.2011.02.029 (http://www.sciencedirect.com/science/ article/pii/S0164121211000549).
-
(2011)
Journal of Systems and Software
-
-
Chang C., .-C.1
Chen K., .-N.2
Lee C., .-F.3
Liu L., .-J.4
-
7
-
-
79952438505
-
Secret image sharing with authentication-chaining and dynamic embedding
-
Z. Eslami, and J.Z. Ahmadabadi Secret image sharing with authentication-chaining and dynamic embedding Journal of Systems and Software 84 5 2011 803 809
-
(2011)
Journal of Systems and Software
, vol.84
, Issue.5
, pp. 803-809
-
-
Eslami, Z.1
Ahmadabadi, J.Z.2
-
8
-
-
33845467262
-
Reversible watermarking: Current status and key issues
-
J.-B. Feng, I.-C. Lin, C.-S. Tsai, and Y.-P. Chu Reversible watermarking: current status and key issues International Journal of Network Security 2 3 2006 161 170
-
(2006)
International Journal of Network Security
, vol.2
, Issue.3
, pp. 161-170
-
-
Feng, J.-B.1
Lin, I.-C.2
Tsai, C.-S.3
Chu, Y.-P.4
-
9
-
-
84886634682
-
Comment on "multistage secret sharing based on one-way function"
-
L. Harn Comment on "Multistage secret sharing based on one-way function" Electronics Letters 31 4 1995 262
-
(1995)
Electronics Letters
, vol.31
, Issue.4
, pp. 262
-
-
Harn, L.1
-
10
-
-
0029197220
-
Multisecret-sharing scheme based on one-way function
-
J. He, and E. Dawson Multisecret-sharing scheme based on one-way function Electronics Letters 31 2 1995 93 95
-
(1995)
Electronics Letters
, vol.31
, Issue.2
, pp. 93-95
-
-
He, J.1
Dawson, E.2
-
14
-
-
0037096996
-
A public verifiable copy protection technique for still images
-
DOI 10.1016/S0164-1212(01)00142-X, PII S016412120100142X
-
W.-B. Lee, and T.-H. Chen A public verifiable copy protection technique for still images Journal of Systems and Software 62 3 2002 195 204 (Pubitemid 34524930)
-
(2002)
Journal of Systems and Software
, vol.62
, Issue.3
, pp. 195-204
-
-
Lee, W.-B.1
Chen, T.-H.2
-
15
-
-
77549088025
-
A novel data hiding scheme based on modulus function
-
C.-F. Lee, and H.-L. Chen A novel data hiding scheme based on modulus function Journal of Systems and Software 83 5 2010 832 843
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.5
, pp. 832-843
-
-
Lee, C.-F.1
Chen, H.-L.2
-
16
-
-
33748785719
-
Security of fragile watermarking scheme for image authentication
-
DOI 10.1179/174313106X106278
-
K.-C. Liao, W.-B. Lee, and C.-W. Liao Security of fragile watermarking scheme for image authentication Imaging Science Journal 54 September (3) 2006 129 133 (Pubitemid 44408642)
-
(2006)
Imaging Science Journal
, vol.54
, Issue.3
, pp. 129-133
-
-
Liao, K.-C.1
Lee, W.-B.2
Liao, C.-W.3
-
17
-
-
4444342040
-
Secret image sharing with steganography and authentication
-
C.-C. Lin, and W.-H. Tsai Secret image sharing with steganography and authentication Journal of Systems and Software 73 3 2004 405 414
-
(2004)
Journal of Systems and Software
, vol.73
, Issue.3
, pp. 405-414
-
-
Lin, C.-C.1
Tsai, W.-H.2
-
18
-
-
0037869332
-
Fragile watermarking scheme for image authentication
-
Jun
-
H.-T. Lu, R.-M. Shen, and F.-L. Chung Fragile watermarking scheme for image authentication Electronics Letters 39 12 2003 898 900 Jun
-
(2003)
Electronics Letters
, vol.39
, Issue.12
, pp. 898-900
-
-
Lu, H.-T.1
Shen, R.-M.2
Chung, F.-L.3
-
21
-
-
0038043478
-
Key establishment in large dynamic groups using one-way function trees
-
A.T. Sherman, and D.A. McGrew Key establishment in large dynamic groups using one-way function trees IEEE Transactions on Software Engineering 29 5 2003 444 458
-
(2003)
IEEE Transactions on Software Engineering
, vol.29
, Issue.5
, pp. 444-458
-
-
Sherman, A.T.1
McGrew, D.A.2
-
23
-
-
0036794537
-
Secret image sharing
-
DOI 10.1016/S0097-8493(02)00131-0, PII S0097849302001310
-
C.-C. Thien, and J.-C. Lin Secret image sharing Computers & Graphics 26 5 2002 765 770 (Pubitemid 35152309)
-
(2002)
Computers and Graphics (Pergamon)
, vol.26
, Issue.5
, pp. 765-770
-
-
Thien, C.-C.1
Lin, J.-C.2
-
25
-
-
0142057129
-
A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
-
DOI 10.1016/S0031-3203(03)00221-8
-
C.-C. Thien, and J.-C. Lin A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function Pattern Recognition 36 12 2003 2875 2881 (Pubitemid 37293400)
-
(2003)
Pattern Recognition
, vol.36
, Issue.12
, pp. 2875-2881
-
-
Thien, C.-C.1
Lin, J.-C.2
-
26
-
-
78951495249
-
Medical image security and EPR hiding using Shamir's secret sharing scheme
-
M. Ulutas, G. Ulutas, and V.V. Nabiyev Medical image security and EPR hiding using Shamir's secret sharing scheme Journal of Systems and Software 84 3 2011 341 353
-
(2011)
Journal of Systems and Software
, vol.84
, Issue.3
, pp. 341-353
-
-
Ulutas, M.1
Ulutas, G.2
Nabiyev, V.V.3
-
27
-
-
32844469722
-
Secret image sharing with smaller shadow images
-
DOI 10.1016/j.patrec.2005.09.021, PII S0167865505002734
-
R.-Z. Wang, and C.-H. Su Secret image sharing with smaller shadow images Pattern Recognition Letters 27 6 2006 551 555 (Pubitemid 43254598)
-
(2006)
Pattern Recognition Letters
, vol.27
, Issue.6
, pp. 551-555
-
-
Wang, R.-Z.1
Su, C.-H.2
-
28
-
-
35848929919
-
A high quality steganographic method with pixel-value differencing and modulus function
-
DOI 10.1016/j.jss.2007.01.049, PII S0164121207000593
-
C.-M. Wang, N.-I. Wu, C.-S. Tsai, and M.-S. Hwang A high quality steganographic method with pixel-value differencing and modulus function Journal of Systems and Software 81 1 2008 150 158 (Pubitemid 350060985)
-
(2008)
Journal of Systems and Software
, vol.81
, Issue.1
, pp. 150-158
-
-
Wang, C.-M.1
Wu, N.-I.2
Tsai, C.-S.3
Hwang, M.-S.4
-
29
-
-
0347172700
-
-
Signal and Image Processing Institute at the University of Southern California
-
Weber, A.G.; 2006. The USC-SIPI image database: Version 5, available at http://sipi.usc.edu/database, Signal and Image Processing Institute at the University of Southern California.
-
(2006)
The USC-SIPI Image Database: Version 5
-
-
Weber, A.G.1
-
31
-
-
54049120254
-
Enhance the image sharing with steganography and authentication
-
Harbin, China August 15-17
-
Wu, C.-C.; Kao, S.-J.; Kuo, W.-C.; Hwang, M.-S.; "Enhance the image sharing with steganography and authentication," Proceedings of The Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008), Harbin, China, pp. 1177-1181, August 15-17, 2008.
-
(2008)
Proceedings of the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008)
, pp. 1177-1181
-
-
Wu C., .-C.1
Kao S., .-J.2
Kuo W., .-C.3
Hwang M., .-S.4
-
32
-
-
52449116208
-
A Robust-Fragile Watermarking Scheme for Image Authentication
-
Dalian, China June 18-20
-
Wu, C.-C.; Kao, S.-J.; Kuo, W.-C.; Hwang, M.-S.; "A Robust-Fragile Watermarking Scheme for Image Authentication," Proceedings of The Third International Conference on Innovative Computing, Information and Control (ICICIC 2008), Dalian, China, pp. 176, June 18-20, 2008.
-
(2008)
Proceedings of the Third International Conference on Innovative Computing, Information and Control (ICICIC 2008)
, pp. 176
-
-
Wu C., .-C.1
Kao S., .-J.2
Kuo W., .-C.3
Hwang M., .-S.4
-
33
-
-
79551658534
-
Reference sharing mechanism for watermark self-embedding
-
Z. Xinpeng, W. Shuozhong, Q. Zhenxing, and F. Guorui Reference sharing mechanism for watermark self-embedding IEEE Transactions on Image Processing 20 2 2011 485 495
-
(2011)
IEEE Transactions on Image Processing
, vol.20
, Issue.2
, pp. 485-495
-
-
Xinpeng, Z.1
Shuozhong, W.2
Zhenxing, Q.3
Guorui, F.4
-
34
-
-
62349091742
-
A comment on "sharing secrets in stegoimages with authentication"
-
C.-N. Yang, and C.-B. Ciou A comment on "Sharing secrets in stegoimages with authentication" Pattern Recognition 42 7 2009 1615 1619
-
(2009)
Pattern Recognition
, vol.42
, Issue.7
, pp. 1615-1619
-
-
Yang, C.-N.1
Ciou, C.-B.2
-
35
-
-
34248584507
-
Improvements of image sharing with steganography and authentication
-
DOI 10.1016/j.jss.2006.11.022, PII S0164121206003451, Dynamic Resource Management in Distributed Real-Time Systems
-
C.-N. Yang, T.-S. Chen, K.-H. Yu, and C.-C. Wang Improvements of image sharing with steganography and authentication Journal of Systems and Software 80 7 2007 1070 1076 (Pubitemid 46754469)
-
(2007)
Journal of Systems and Software
, vol.80
, Issue.7
, pp. 1070-1076
-
-
Yang, C.-N.1
Chen, T.-S.2
Yu, K.H.3
Wang, C.-C.4
|