Exploring pixel-value differencing and base decomposition for low distortion data embedding
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..
[2] Xinpeng Zhang,et al. Steganography using multiple-base notational system and human vision sensitivity , 2005, IEEE Signal Process. Lett..
[3] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[4] Rashid Ansari,et al. Robust Data Hiding in Audio Using Allpass Filters , 2007, IEEE Transactions on Audio, Speech, and Language Processing.
[5] M. Kendall,et al. An Introduction to the Theory of Statistics. , 1911 .
[6] J. Rodgers,et al. Thirteen ways to look at the correlation coefficient , 1988 .
[7] J. Wolfowitz,et al. Introduction to the Theory of Statistics. , 1951 .
[8] Nikolay N. Ponomarenko,et al. A NEW FULL-REFERENCE QUALITY METRICS BASED ON HVS , 2006 .
[9] Min-Shiang Hwang,et al. A high quality steganographic method with pixel-value differencing and modulus function , 2008, J. Syst. Softw..
[10] Chin-Chen Chang,et al. An improvement of EMD embedding method for large payloads by pixel segmentation strategy , 2008, Image Vis. Comput..
[11] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[12] Thierry Pun,et al. A Stochastic Approach to Content Adaptive Digital Image Watermarking , 1999, Information Hiding.
[13] Chung-Ming Wang,et al. Toward Optimal Embedding Capacity for Permutation Steganography , 2009, IEEE Signal Processing Letters.
[14] Cheng-Hsing Yang,et al. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.
[15] Ebroul Izquierdo,et al. Robust and Transparent Color Modulation for Text Data Hiding , 2008, IEEE Transactions on Multimedia.
[16] James Hu,et al. DVQ: A digital video quality metric based on human vision , 2001 .
[17] Alex ChiChung Kot,et al. Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving , 2007, IEEE Transactions on Multimedia.
[18] Min-Shiang Hwang,et al. Data Hiding: Current Status and Key Issues , 2007, Int. J. Netw. Secur..
[19] Chao-Hung Lin,et al. A High Capacity 3D Steganography Algorithm , 2009, IEEE Transactions on Visualization and Computer Graphics.
[20] Tieyong Zeng,et al. A Generalization of LSB Matching , 2009, IEEE Signal Processing Letters.
[21] Cheng-Hsing Yang,et al. Inverted pattern approach to improve image quality of information hiding by LSB substitution , 2008, Pattern Recognit..
[22] Zhou Wang,et al. Information Content Weighting for Perceptual Image Quality Assessment , 2011, IEEE Transactions on Image Processing.
[23] J. Astola,et al. ON BETWEEN-COEFFICIENT CONTRAST MASKING OF DCT BASIS FUNCTIONS , 2007 .
[24] Chin-Chen Chang,et al. A steganographic method for digital images using side match , 2004, Pattern Recognit. Lett..
[25] Thierry Pun,et al. Generalized watermarking attack based on watermark estimation and perceptual remodulation , 2000, Electronic Imaging.
[26] Kiyoshi Tanaka,et al. Complete Video Quality-Preserving Data Hiding , 2009, IEEE Transactions on Circuits and Systems for Video Technology.
[27] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[28] Xinpeng Zhang,et al. Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security , 2004, Pattern Recognit. Lett..
[29] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[30] A. Bovik,et al. A universal image quality index , 2002, IEEE Signal Processing Letters.
[31] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[32] Ton Kalker,et al. Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform , 2007, IEEE Transactions on Information Forensics and Security.
[33] Thierry Pun,et al. Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..
[34] Wen-Hsiang Tsai,et al. Adaptive data hiding in palette images by color ordering and mapping with security protection , 2004, IEEE Trans. Commun..