Inverted pattern approach to improve image quality of information hiding by LSB substitution
暂无分享,去创建一个
[1] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[2] Der-Chyuan Lou,et al. Steganographic Method for Secure Communications , 2002, Comput. Secur..
[3] Chin-Chen Chang,et al. New image steganographic methods using run-length approach , 2006, Inf. Sci..
[4] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[5] Chin-Chen Chang,et al. High Capacity Data Hiding for Grayscale Images , 2008, Fundam. Informaticae.
[6] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..
[7] Masaaki Fujiyoshi,et al. Lossless Data Hiding in the Spatial Domain for High Quality Images , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[8] A. Murat Tekalp,et al. Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.
[9] Yuan-Pei Lin,et al. Wavelet tree quantization for copyright protection watermarking , 2004, IEEE Transactions on Image Processing.
[10] Cheng-Hsing Yang,et al. Weighted bipartite graph for locating optimal LSB substitution for secret embedding , 2006 .
[11] Chin-Chen Chang,et al. A steganographic method for digital images using side match , 2004, Pattern Recognit. Lett..
[12] Shiuh-Jeng Wang,et al. Steganography of capacity required using modulo operator for embedding secret image , 2005, Appl. Math. Comput..
[13] Shih-Kun Huang,et al. Cocktail Watermarking for Digital Image Protection , 2000, IEEE Trans. Multim..
[14] Lee-Ming Cheng,et al. Improved hiding data in images by optimal moderately-significant-bit replacement , 2001 .
[15] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[16] Ja-Chen Lin,et al. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..
[17] M. Hwang,et al. Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .
[18] Harold Joseph Highland,et al. Data encryption: A non-mathematical approach , 1997, Comput. Secur..
[19] Andrew D. Ker. Improved Detection of LSB Steganography in Grayscale Images , 2004, Information Hiding.
[20] A. Murat Tekalp,et al. Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..
[21] Tadanori Mizuno,et al. A User Authentication System Using Schema of Visual Memory , 2006, BioADIT.
[22] Chin-Chen Chang,et al. Hiding data in multitone images for data communications , 2004 .
[23] Yeuan-Kuen Lee,et al. High capacity image steganographic model , 2000 .
[24] Chin-Chen Chang,et al. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..
[25] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[26] Po-Whei Huang,et al. A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..
[27] Min-Shiang Hwang,et al. A high quality steganographic method with pixel-value differencing and modulus function , 2008, J. Syst. Softw..