HighCapacity Data Hiding Scheme for DCT-based Images
暂无分享,去创建一个
[1] Chin-Chen Chang,et al. Reversible Steganographic Method with High Payload for JPEG Images , 2008, IEICE Trans. Inf. Syst..
[2] Kuo-Liang Chung,et al. A novel SVD- and VQ-based image hiding scheme , 2001, Pattern Recognit. Lett..
[3] B. Dasarathy. Image data compression - block truncation coding , 1995 .
[4] Jun Tian,et al. Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..
[5] Zhicheng Ni,et al. Distortionless data hiding based on integer wavelet transform , 2002 .
[6] Chin-Chen Chang,et al. A Reversible Data Hiding Scheme Based on Side Match Vector Quantization , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[7] Hitoshi Kiya,et al. A Method of Embedding Binary Data into JPEG Bitstreams , 2002, Systems and Computers in Japan.
[8] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[9] A. Murat Tekalp,et al. Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.
[10] Mohammed Ghanbari,et al. Standard Codecs: Image Compression to Advanced Video Coding , 2003 .
[11] Chin-Chen Chang,et al. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..
[12] Chin-Chen Chang,et al. A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding , 2008, Soft Comput..
[13] Motoi Iwata,et al. Digital Steganography Utilizing Features of JPEG Images , 2004 .
[14] Chin-Chen Chang,et al. Reversible hiding in DCT-based compressed images , 2007, Inf. Sci..
[15] Rui Du,et al. Invertible authentication watermark for JPEG images , 2001, Proceedings International Conference on Information Technology: Coding and Computing.
[16] Chia-Chen Lin,et al. DCT-based reversible data hiding scheme , 2009, ICUIMC '09.
[17] A. Murat Tekalp,et al. Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.
[18] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[19] Yeuan-Kuen Lee,et al. High capacity image steganographic model , 2000 .
[20] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..
[21] Chin-Chen Chang,et al. A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..