ZIG-ZAG PVD - A Nontraditional Approach
暂无分享,去创建一个
[1] Der-Chyuan Lou,et al. Steganographic Method for Secure Communications , 2002, Comput. Secur..
[2] Chin-Chen Chang,et al. High payload steganography mechanism using hybrid edge detector , 2010, Expert Syst. Appl..
[3] Chin-Chen Chang,et al. A new steganographic method for color and grayscale image hiding , 2007, Comput. Vis. Image Underst..
[4] Ki-Ryong Kwon,et al. An Image Steganography Using Pixel Characteristics , 2005, CIS.
[5] Jessica J. Fridrich,et al. Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.
[6] M. Hwang,et al. Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .
[7] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[8] Chin-Chen Chang,et al. A steganographic method for digital images using side match , 2004, Pattern Recognit. Lett..
[9] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[10] Shiuh-Jeng Wang,et al. Steganography of capacity required using modulo operator for embedding secret image , 2005, Appl. Math. Comput..
[11] Chin-Chen Chang,et al. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..
[12] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[13] Andrew D. Ker. Quantitative evaluation of pairs and RS steganalysis , 2004, IS&T/SPIE Electronic Imaging.
[14] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[15] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[16] Min-Shiang Hwang,et al. A high quality steganographic method with pixel-value differencing and modulus function , 2008, J. Syst. Softw..
[17] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[18] Chang-Chou Lin,et al. Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..
[19] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..
[20] Min-Shiang Hwang,et al. Data Hiding: Current Status and Key Issues , 2007, Int. J. Netw. Secur..
[21] Yan Huang,et al. Research on Data Hiding Capacity , 2007, Int. J. Netw. Secur..
[22] Andreas Westfeld. Space filling curves in steganalysis , 2005, IS&T/SPIE Electronic Imaging.
[23] M. Hwang,et al. (IEE Proceedings Vision, Image and Signal Processing, 152(5):611-615)Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement , 2005 .
[24] Ja-Chen Lin,et al. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..
[25] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[26] R. Akila,et al. A Comparative Analysis of Image Steganography , 2010 .