On the embedding limits of the discrete cosine transform
暂无分享,去创建一个
[1] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[2] Chang-Tsun Li,et al. A palette-based image steganographic method using colour quantisation , 2005, IEEE International Conference on Image Processing 2005.
[3] B. S. Manjunath,et al. Robust image-adaptive data hiding using erasure and error correction , 2004, IEEE Transactions on Image Processing.
[4] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[5] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[6] Michiharu Niimi,et al. A Large Capacity Steganography Using Color BMP Images , 1998, ACCV.
[7] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[8] T. Rabie. High-capacity steganography , 2013, 2013 6th International Congress on Image and Signal Processing (CISP).
[9] Kevin Curran,et al. An Evaluation of Steganography Methods , 2003 .
[10] Chia-Chen Lin,et al. DCT-based Reversible Data Hiding Scheme , 2010 .
[11] Chin-Chen Chang,et al. Reversible Steganographic Method with High Payload for JPEG Images , 2008, IEICE Trans. Inf. Syst..
[12] P. Yip,et al. Discrete Cosine Transform: Algorithms, Advantages, Applications , 1990 .
[13] Chia-Chen Lin,et al. HighCapacity Data Hiding Scheme for DCT-based Images , 2010, J. Inf. Hiding Multim. Signal Process..
[14] Yeuan-Kuen Lee,et al. High capacity image steganographic model , 2000 .
[15] Min Wu,et al. Data hiding in image and video .I. Fundamental issues and solutions , 2003, IEEE Trans. Image Process..
[16] Anil K. Jain,et al. Hiding a face in a fingerprint image , 2002, Object recognition supported by user interaction for service robots.
[17] Chin-Chen Chang,et al. A Reversible Data Hiding Scheme Based on Side Match Vector Quantization , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[18] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[19] Tamer F. Rabie,et al. Digital Image Steganography: An FFT Approach , 2012, NDT.
[20] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[21] Motoi Iwata,et al. Digital Steganography Utilizing Features of JPEG Images , 2004 .
[22] George Pavlidis,et al. JPEG2000 over noisy communication channels thorough evaluation and cost analysis , 2003, Signal Process. Image Commun..
[23] Wilhelm Burger,et al. Digital Image Processing - An Algorithmic Introduction using Java , 2008, Texts in Computer Science.
[24] A. Murat Tekalp,et al. Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.
[25] Jun Tian,et al. Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..
[26] Chin-Chen Chang,et al. Reversible hiding in DCT-based compressed images , 2007, Inf. Sci..
[27] Chin-Chen Chang,et al. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..
[28] Chin-Chen Chang,et al. A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding , 2008, Soft Comput..
[29] Christoph Busch,et al. Integer DCT-based reversible watermarking for images using companding technique , 2004, IS&T/SPIE Electronic Imaging.
[30] Kuo-Liang Chung,et al. A novel SVD- and VQ-based image hiding scheme , 2001, Pattern Recognit. Lett..
[31] Tamer F. Rabie,et al. Frequency-domain data hiding based on the Matryoshka principle , 2007, Int. J. Adv. Media Commun..
[32] Chin-Chen Chang,et al. A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..
[33] N. Ahmed,et al. Discrete Cosine Transform , 1996 .
[34] Philip Ogunbona,et al. High-capacity steganography using a shared colour palette , 2005 .