Digital-Invisible-Ink Data Hiding Based on Spread-Spectrum and Quantization Techniques
暂无分享,去创建一个
Ja-Ling Wu | Chun-Hsiang Huang | Shang-Chih Chuang | Ja-Ling Wu | Chun-Hsiang Huang | Shang-Chih Chuang
[1] Ja-Ling Wu,et al. Digital invisible ink: revealing true secrets via attacking , 2006, ASIACCS '06.
[2] Edward J. Delp,et al. A Review of Data Hiding in Digital Images , 1999, PICS.
[3] Ja-Ling Wu,et al. A blind watermarking algorithm with semantic meaningful watermarks , 2000, Conference Record of the Thirty-Fourth Asilomar Conference on Signals, Systems and Computers (Cat. No.00CH37154).
[4] Scott Craver,et al. On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.
[5] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[6] Sushil Jajodia,et al. Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).
[7] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[8] Shih-Kun Huang,et al. Cocktail Watermarking for Digital Image Protection , 2000, IEEE Trans. Multim..
[9] Darko Kirovski,et al. Multimedia Security Handbook , 2004 .
[10] Chun-Shien Lu,et al. Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property , 2004 .
[11] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.
[12] Miroslav Goljan,et al. Steganalysis based on JPEG compatibility , 2001, SPIE ITCom.
[13] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[14] Ahmed H. Tewfik,et al. Data hiding for video-in-video , 1997, Proceedings of International Conference on Image Processing.
[15] Min Wu,et al. Multimedia Data Hiding , 2003, Springer New York.
[16] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[17] Friedrich L. Bauer,et al. Decrypted secrets - methods and maxims of cryptology , 1997 .
[18] Henrique S. Malvar,et al. Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..
[19] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[20] Sushil Jajodia,et al. Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.
[21] Ja-Ling Wu,et al. Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..
[22] Ja-Ling Wu,et al. Digital invisible ink and its applications in steganography , 2006, MM&Sec '06.
[23] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.