Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector
暂无分享,去创建一个
[1] George J. Klir,et al. Fuzzy sets, uncertainty and information , 1988 .
[2] Y. Kuo,et al. A new fuzzy edge detection method for image enhancement , 1997, Proceedings of 6th International Fuzzy Systems Conference.
[3] Rainer Böhme,et al. Exploiting Preserved Statistics for Steganalysis , 2004, Information Hiding.
[4] Lotfi A. Zadeh,et al. Fuzzy Sets , 1996, Inf. Control..
[5] Jeng-Shyang Pan,et al. The optimized copyright protection system with genetic watermarking , 2008, Soft Comput..
[6] T.M. Amarunnishad,et al. A Fuzzy Complement Edge Operator , 2006, 2006 International Conference on Advanced Computing and Communications.
[7] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[8] Jiri Fridrich,et al. Secure Steganographic Methods for Palette Images , 1999, Information Hiding.
[9] Antje Winkler,et al. Embedding with syndrome coding based on BCH codes: The corrected version of this paper is now available as full text. To view the original document as presented in the printed proceedings (with its errors), download the supplemental file , 2006, MM&Sec '06.
[10] James C. Bezdek,et al. A geometric approach to edge detection , 1998, IEEE Trans. Fuzzy Syst..
[11] Jessica J. Fridrich,et al. Efficient Wet Paper Codes , 2005, Information Hiding.
[12] Min Wu,et al. Data hiding in digital binary image , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).
[13] Thomas S. Huang,et al. Image processing , 1971 .
[14] Jessica J. Fridrich,et al. Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.
[15] Jessica J. Fridrich,et al. Writing on wet paper , 2005, IEEE Transactions on Signal Processing.
[16] Huaiqing Wang,et al. Cyber warfare: steganography vs. steganalysis , 2004, CACM.
[17] Jessica J. Fridrich,et al. Constructing Good Covering Codes for Applications in Steganography , 2008, Trans. Data Hiding Multim. Secur..
[18] Hamid R. Tizhoosh,et al. Fast fuzzy edge detection , 2002, 2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622).
[19] Fabrizio Russo,et al. FIRE operators for image processing , 1999, Fuzzy Sets Syst..
[20] Gregory A. Kabatiansky,et al. Information hiding by coverings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[21] E.E. Pissaloux,et al. Image Processing , 1994, Proceedings. Second Euromicro Workshop on Parallel and Distributed Processing.
[22] Milan Sonka,et al. Image Processing, Analysis and Machine Vision , 1993, Springer US.
[23] Hsiang-Cheh Huang,et al. Genetic Watermarking for Zerotree-Based Applications , 2008 .
[24] Elke Franz. Steganography Preserving Statistical Properties , 2002, Information Hiding.
[25] Yu-Chee Tseng,et al. A secure data hiding scheme for binary images , 2002, IEEE Trans. Commun..
[26] Xinpeng Zhang,et al. Efficient double-layered steganographic embedding , 2007 .
[27] Jessica J. Fridrich,et al. Matrix embedding for large payloads , 2006, IEEE Transactions on Information Forensics and Security.
[28] V. K. Govindan,et al. Improving BTC image compression using a fuzzy complement edge operator , 2008, Signal Process..