Improved Exploiting Modification Direction Method by Modulus Operation
暂无分享,去创建一个
[1] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[2] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[3] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[4] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[5] Andrew D. Ker. Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.
[6] Ki-Hyun Jung,et al. The Hiding of Secret Data Using the Run Length Matching Method , 2007, KES-AMSTA.
[7] Cheng-Hsing Yang,et al. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.
[8] Sankar K. Pal,et al. International Journal of Signal Processing , Image Processing and Pattern Recognition , 2008 .
[9] Chin-Chen Chang,et al. Reversible information hiding for VQ indices based on locally adaptive coding , 2009, J. Vis. Commun. Image Represent..
[10] A. Bovik,et al. A universal image quality index , 2002, IEEE Signal Processing Letters.
[11] Hannes Federrath,et al. Modeling the Security of Steganographic Systems , 1998, Information Hiding.
[12] Chin-Chen Chang,et al. Improvements of EMD Embedding for Large Payloads , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[13] Te-Ming Tu,et al. Adaptive image steganographic scheme based on Tri-way Pixel-Value Differencing , 2007, 2007 IEEE International Conference on Systems, Man and Cybernetics.
[14] Chin-Chen Chang,et al. A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[15] Xinpeng Zhang,et al. Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.
[16] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[17] Chin-Chen Chang,et al. An improvement of EMD embedding method for large payloads by pixel segmentation strategy , 2008, Image Vis. Comput..
[18] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.