High-capacity steganography: a global-adaptive-region discrete cosine transform approach
暂无分享,去创建一个
[1] B. S. Manjunath,et al. Robust image-adaptive data hiding using erasure and error correction , 2004, IEEE Transactions on Image Processing.
[2] Reza Safabakhsh,et al. High-capacity method for hiding data in the discrete cosine transform domain , 2013, J. Electronic Imaging.
[3] George Pavlidis,et al. JPEG2000 over noisy communication channels thorough evaluation and cost analysis , 2003, Signal Process. Image Commun..
[4] Wilhelm Burger,et al. Digital Image Processing - An Algorithmic Introduction using Java , 2008, Texts in Computer Science.
[5] Chia-Chen Lin,et al. DCT-based reversible data hiding scheme , 2009, ICUIMC '09.
[6] A. Murat Tekalp,et al. Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.
[7] Min Wu,et al. Data hiding in image and video .I. Fundamental issues and solutions , 2003, IEEE Trans. Image Process..
[8] Motoi Iwata,et al. Digital Steganography Utilizing Features of JPEG Images , 2004 .
[9] Philip Ogunbona,et al. High-capacity steganography using a shared colour palette , 2005 .
[10] Ibrahim Kamel,et al. On the embedding limits of the discrete cosine transform , 2015, Multimedia Tools and Applications.
[11] Chin-Chen Chang,et al. Reversible Steganographic Method with High Payload for JPEG Images , 2008, IEICE Trans. Inf. Syst..
[12] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[13] Michiharu Niimi,et al. A Large Capacity Steganography Using Color BMP Images , 1998, ACCV.
[14] Anil K. Jain,et al. Hiding a face in a fingerprint image , 2002, Object recognition supported by user interaction for service robots.
[15] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[16] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[17] T. Rabie. High-capacity steganography , 2013, 2013 6th International Congress on Image and Signal Processing (CISP).
[18] N. Ahmed,et al. Discrete Cosine Transform , 1996 .
[19] P. Yip,et al. Discrete Cosine Transform: Algorithms, Advantages, Applications , 1990 .
[20] Chin-Chen Chang,et al. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..
[21] Chin-Chen Chang,et al. A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding , 2008, Soft Comput..
[22] Lodevik Dyastotto Wardhana. IMPLEMENTASI DAN ANALISIS VIDEO WATERMARKING DENGAN FORMAT VIDEO AVI BERBASIS LSB (LEAST SIGNIFICANT BIT) DAN SSB-4 (SYSTEM OF STEGANOGRAPHY USING BIT 4) , 2014 .
[23] Jun Tian,et al. Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..
[24] Chin-Chen Chang,et al. Reversible hiding in DCT-based compressed images , 2007, Inf. Sci..
[25] Chin-Chen Chang,et al. A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..
[26] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[27] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[28] Chang-Tsun Li,et al. A palette-based image steganographic method using colour quantisation , 2005, IEEE International Conference on Image Processing 2005.
[29] Yeuan-Kuen Lee,et al. High capacity image steganographic model , 2000 .
[30] Pierre-André Farine,et al. Efficient Compressed Domain Target Image Search and Retrieval , 2005, CIVR.
[31] Chin-Chen Chang,et al. A Reversible Data Hiding Scheme Based on Side Match Vector Quantization , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[32] Tamer F. Rabie,et al. Digital Image Steganography: An FFT Approach , 2012, NDT.
[33] Christoph Busch,et al. Integer DCT-based reversible watermarking for images using companding technique , 2004, IS&T/SPIE Electronic Imaging.
[34] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[35] Pierre-André Farine,et al. Low Complexity Image Matching in the Compressed Domain by using the DCT-phase , 2004 .
[36] Kevin Curran,et al. An Evaluation of Steganography Methods , 2003 .
[37] Chia-Chen Lin,et al. HighCapacity Data Hiding Scheme for DCT-based Images , 2010, J. Inf. Hiding Multim. Signal Process..
[38] Kuo-Liang Chung,et al. A novel SVD- and VQ-based image hiding scheme , 2001, Pattern Recognit. Lett..
[39] Tamer F. Rabie,et al. Frequency-domain data hiding based on the Matryoshka principle , 2007, Int. J. Adv. Media Commun..