Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques

[1]  Shih-Hsuan Yang,et al.  A digital watermarking scheme based on SPIHT coding , 2001, IEEE International Conference on Multimedia and Expo, 2001. ICME 2001..

[2]  Hideki Noda,et al.  BPCS steganography using EZW lossy compressed images , 2002, Pattern Recognit. Lett..

[3]  Jerome M. Shapiro,et al.  Embedded image coding using zerotrees of wavelet coefficients , 1993, IEEE Trans. Signal Process..

[4]  Chin-Hsing Chen,et al.  A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection , 2005, Pattern Recognit..

[5]  Shiuh-Jeng Wang,et al.  Steganography of capacity required using modulo operator for embedding secret image , 2005, Appl. Math. Comput..

[6]  Qiuqi Ruan,et al.  Secure semi-blind watermarking based on iteration mapping and image features , 2005, Pattern Recognit..

[7]  Chin-Hsing Chen,et al.  Public-key image steganography using discrete cosine transform and quadtree partition vector quantization coding , 2003 .

[8]  William A. Pearlman,et al.  A new, fast, and efficient image codec based on set partitioning in hierarchical trees , 1996, IEEE Trans. Circuits Syst. Video Technol..

[9]  Chin-Chen Chang,et al.  A virtual image cryptosystem based upon vector quantization , 1998, IEEE Trans. Image Process..

[10]  Ja-Chen Lin,et al.  Hiding data in images by optimal moderately-significant-bit replacement , 2000 .

[11]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[12]  Wen-Yuan Chen,et al.  Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation , 2007, Appl. Math. Comput..

[13]  Ahmed Abu-Hajar,et al.  Region of interest coding using partial-SPIHT , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[14]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[15]  Gilbert L. Peterson,et al.  A new blind method for detecting novel steganography , 2005, Digit. Investig..

[16]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[17]  W. Tsai,et al.  Data hiding in images via multiple-based number conversion and lossy compression , 1998 .

[18]  Giovanni Poggi,et al.  Compression of multispectral images by three-dimensional SPIHT algorithm , 2000, IEEE Trans. Geosci. Remote. Sens..