A secure data hiding scheme for two-color images
暂无分享,去创建一个
[1] Ping Wah Wong,et al. A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[2] Frank Bossen,et al. Digital watermarking of color images using amplitude modulation , 1998, J. Electronic Imaging.
[3] M. Y. Wu,et al. A Novel Data Embedding Method for Two-Color Facsimile Images , 1998 .
[4] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..
[5] Gustavus J. Simmons,et al. Results concerning the bandwidth of subliminal channels , 1998, IEEE J. Sel. Areas Commun..
[6] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[7] Ross J. Anderson. Stretching the Limits of Steganography , 1996, Information Hiding.
[8] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[9] William Stallings,et al. Cryptography and network security , 1998 .
[10] D. Kahn. The codebreakers : the story of secret writing , 1968 .
[11] Frank Bossen,et al. Digital signature of color images using amplitude modulation , 1997, Electronic Imaging.
[12] Walter Bender,et al. Information Hiding to Foil the Casual Counterfeiter , 1998, Information Hiding.
[13] Peter Wayner. Should encryption be regulated: politics, not technology, may hamstring the use of data encryption in the U.S. , 1993 .
[14] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[15] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[16] Gustavus J. Simmons,et al. The history of subliminal channels , 1996, IEEE J. Sel. Areas Commun..
[17] Ping Wah Wong,et al. A Watermark for Image Integrity and Ownership Verification , 1998, PICS.
[18] Ingo Stierand,et al. Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best , 1996, Information Hiding.