A steganographic method for images by pixel-value differencing
暂无分享,去创建一个
[1] Eckhard Koch,et al. Towards Robust and Hidden Image Copyright Labeling , 1995 .
[2] Jian Zhao,et al. In business today and tomorrow , 1998, CACM.
[3] Ahmed H. Tewfik,et al. Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.
[4] D Goerke. [At the limits]. , 1980, Krankenpflege Journal.
[5] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[6] Edward J. Delp,et al. Perceptual watermarks for digital images and video , 1999, Electronic Imaging.
[7] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[8] Andreas Pfitzmann,et al. Steganography Secure against Cover-Stego-Attacks , 1999, Information Hiding.
[9] Ali N. Akansu,et al. Capacity estimates for data hiding in compressed images , 2001, IEEE Trans. Image Process..
[10] Michael Scott,et al. Fractal Based Image Steganography , 1996, Information Hiding.
[11] Jiri Fridrich,et al. Secure Steganographic Methods for Palette Images , 1999, Information Hiding.
[12] I. Pitas,et al. The use of watermarks in the protection of digital multimedia products , 1999, Proc. IEEE.
[13] D. Artz,et al. Digital steganography: hiding data within data , 2001 .
[14] Wenjun Zeng,et al. Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..
[15] Edward J. Delp,et al. Digital watermarking: algorithms and applications , 2001, IEEE Signal Process. Mag..
[16] Ingemar J. Cox,et al. Watermarking applications and their properties , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[17] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.
[18] Jiri Fridrich,et al. Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[19] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[20] Minerva M. Yeung,et al. An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.
[21] Nicholas F. Maxemchuk,et al. Electronic document distribution , 1994, AT&T Technical Journal.
[22] Jessica J. Fridrich,et al. Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.
[23] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[24] Kineo Matsui,et al. Embedding a seal into a picture under orthogonal wavelet transform , 1996, Proceedings of the Third IEEE International Conference on Multimedia Computing and Systems.
[25] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[26] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[27] Andreas Pfitzmann,et al. Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego , Jsteg , Steganos , and STools — and Some Lessons Learned , 2000 .
[28] Ioannis Pitas,et al. Robust image watermarking in the spatial domain , 1998, Signal Process..