Matrix embedding in finite abelian group
暂无分享,去创建一个
Weiming Zhang | Xiaolong Li | Bin Yang | Siren Cai | Xiaolong Li | Bin Yang | Weiming Zhang | Siren Cai
[1] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[2] X. Zhang,et al. Improved modification direction methods , 2010, Comput. Math. Appl..
[3] Jessica J. Fridrich,et al. Practical methods for minimizing embedding impact in steganography , 2007, Electronic Imaging.
[4] Arnulf Von Mrose. Untere Schranken für die Reichweiten von Extremalbasen fester Ordnung , 1979 .
[5] Gregory A. Kabatiansky,et al. Information hiding by coverings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[6] Xinpeng Zhang,et al. Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.
[7] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[8] Tieyong Zeng,et al. A Generalization of LSB Matching , 2009, IEEE Signal Processing Letters.
[9] Wien Hong,et al. Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique , 2013, Inf. Sci..
[10] Chin-Chen Chang,et al. A steganographic scheme by fully exploiting modification directions , 2011, Expert Syst. Appl..
[11] Cheng-Hsing Yang,et al. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.
[12] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[13] Yunkai Gao,et al. Improving embedding efficiency via matrix embedding: A case study , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[14] Bin Wang,et al. A Study of Optimal Matrix for Efficient Matrix Embedding in , 2012, IWDW.
[15] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[16] Jessica J. Fridrich,et al. Constructing Good Covering Codes for Applications in Steganography , 2008, Trans. Data Hiding Multim. Secur..
[17] Petr Lisonek,et al. Linear codes for high payload steganography , 2009, Discret. Appl. Math..
[18] Jessica J. Fridrich,et al. Writing on wet paper , 2005, IEEE Transactions on Signal Processing.
[19] Huan Xu,et al. An improved section-wise exploiting modification direction method , 2010, Signal Process..
[20] Yen-Ping Chu,et al. A Novel Image Data Hiding Scheme with Diamond Encoding , 2009, EURASIP J. Inf. Secur..
[21] M. Hwang,et al. Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .
[22] Bin Li,et al. A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..
[23] Bin Li,et al. Targeted Steganalysis of Edge Adaptive Image Steganography Based on LSB Matching Revisited Using B-Spline Fitting , 2012, IEEE Signal Processing Letters.
[24] Hyoung-Joong Kim,et al. Ternary Data Hiding Technique for JPEG Steganography , 2010, IWDW.
[25] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[26] Bin Li,et al. Steganalysis of a PVD-based content adaptive image steganography , 2013, Signal Process..
[27] Tung-Shou Chen,et al. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching , 2012, IEEE Transactions on Information Forensics and Security.
[28] Jessica J. Fridrich,et al. On Steganographic Embedding Efficiency , 2006, Information Hiding.
[29] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[30] Chin-Chen Chang,et al. A novel multi-group exploiting modification direction method based on switch map , 2012, Signal Process..
[31] Xinpeng Zhang,et al. Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security , 2004, Pattern Recognit. Lett..
[32] Harri. Haanpaa,et al. Minimum Sum and Difierence Covers of Abelian Groups , 2004 .
[33] Weiming Zhang,et al. Fast Matrix Embedding by Matrix Extending , 2012, IEEE Transactions on Information Forensics and Security.
[34] Tieyong Zeng,et al. Improvement of the embedding efficiency of LSB matching by sum and difference covering set , 2008, 2008 IEEE International Conference on Multimedia and Expo.
[35] Jessica J. Fridrich,et al. Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.
[36] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[37] Cheng-Hsing Yang,et al. Analyses of Pixel-Value-Differencing Schemes with LSB Replacement in Stegonagraphy , 2007 .
[38] Xiaoqing Lu,et al. Improving embedding efficiency by incorporating SDCS and WPC , 2009, 2009 IEEE International Conference on Multimedia and Expo.
[39] S. Fraser,et al. Sum covers in steganography , 2008 .
[40] Weiming Zhang,et al. Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes , 2008, Information Hiding.
[41] Jessica J. Fridrich,et al. Grid Colorings in Steganography , 2007, IEEE Transactions on Information Theory.
[42] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[43] Wen-Chung Kuo. Image Hiding by Square Fully Exploiting Modification Directions , 2013, J. Inf. Hiding Multim. Signal Process..
[44] D. Frank Hsu,et al. Additive Bases and Extremal Problems in Groups, Graphs and Networks , 2002 .
[45] Jessica J. Fridrich,et al. Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..
[46] Xiaolong Li,et al. A Further Study on a PVD-Based Steganography , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[47] Jessica J. Fridrich,et al. Minimizing the embedding impact in steganography , 2006, MM&Sec '06.
[48] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[49] N. J. A. Sloane,et al. On Additive Bases and Harmonious Graphs , 1980, SIAM J. Algebraic Discret. Methods.
[50] Vladimir Sidorenko,et al. Decoding of convolutional codes using a syndrome trellis , 1994, IEEE Trans. Inf. Theory.
[51] M. van Dijk,et al. Codes for Embedding Information in Grayscale Signals , 2001 .
[52] Gérard D. Cohen,et al. Covering Codes , 2005, North-Holland mathematical library.
[53] Marten van Dijk,et al. Embedding Information in Grayscale Images , 2001 .
[54] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[55] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[56] Wen-Chung Kuo,et al. Hybrid GEMD Data Hiding , 2014, J. Inf. Hiding Multim. Signal Process..
[57] Robert E. Jamison,et al. Minimum Sum Covers of Small Cyclic Groups , 2000 .
[58] Yunkai Gao,et al. Employing Optimal Matrix for Efficient Matrix Embedding , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.