Binary power data hiding scheme

[1]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[2]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[3]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[4]  Luxi Yang,et al.  Optimal pilot sequence design for channel estimation in MIMO OFDM systems , 2006, IEEE Commun. Lett..

[5]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[6]  Chin-Chen Chang,et al.  A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[7]  Chin-Chen Chang,et al.  An improvement of EMD embedding method for large payloads by pixel segmentation strategy , 2008, Image Vis. Comput..

[8]  Lih-Chyau Wuu,et al.  A Data Hiding Scheme with High Embedding Capacity Based on General Improving Exploiting Modification Direction Method , 2009, 2009 Ninth International Conference on Hybrid Intelligent Systems.

[9]  Wien Hong,et al.  Data hiding by Exploiting Modification Direction technique using optimal pixel grouping , 2010, 2010 2nd International Conference on Education Technology and Computer.

[10]  Chin-Chen Chang,et al.  A steganographic scheme by fully exploiting modification directions , 2011, Expert Syst. Appl..

[11]  Xinpeng Zhang,et al.  Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications , 2011, STA.

[12]  Lih-Chyau Wuu,et al.  The high embedding steganographic method based on general multi-EMD , 2012, 2012 International Conference on Information Security and Intelligent Control.

[13]  Chin-Chen Chang,et al.  A novel multi-group exploiting modification direction method based on switch map , 2012, Signal Process..

[14]  Cheng-Hsing Yang,et al.  Data embedding in image-media using weight-function on modulo operations , 2013, TECS.

[15]  W. Kuo,et al.  Data hiding based on generalised exploiting modification direction method , 2013 .

[16]  Wen-Chung Kuo,et al.  A Steganographic Scheme Based on Formula Fully Exploiting Modification Directions , 2013, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[17]  Wen-Chung Kuo,et al.  A Data Hiding Scheme Based on Square Formula Fully Exploiting Modification Directions , 2013 .