Hiding data in spatial domain images with distortion tolerance
暂无分享,去创建一个
[1] Chin-Chen Chang,et al. A virtual image cryptosystem based upon vector quantization , 1998, IEEE Trans. Image Process..
[2] Der-Chyuan Lou,et al. A steganographic scheme for secure communications based on the chaos and euler Theorem , 2004, IEEE Transactions on Multimedia.
[3] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[4] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[5] Chang-Chou Lin,et al. Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..
[6] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..
[7] Steve McLaughlin. IEE Proceedings on Vision Image and Signal Processing , 1996 .
[8] Nikolaos G. Bourbakis,et al. Picture data encryption using scan patterns , 1992, Pattern Recognit..
[9] Oscar C. Au,et al. Data hiding watermarking for halftone images , 2002, IEEE Trans. Image Process..
[10] Nikolaos G. Bourbakis,et al. Lossless compression and information hiding in images , 2004, Pattern Recognit..
[11] Ja-Chen Lin,et al. Hiding data in images by optimal moderately-significant-bit replacement , 2000 .
[12] Chin-Chen Chang,et al. A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..
[13] A. Miyazaki,et al. Wavelet-based watermarking for tamper proofing of still images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[14] Shiuh-Jeng Wang,et al. Steganography of capacity required using modulo operator for embedding secret image , 2005, Appl. Math. Comput..
[15] Xiamu Niu,et al. Print-and-scan model and the watermarking countermeasure , 2005, Image Vis. Comput..
[16] Soo-Chang Pei,et al. Novel robust watermarking technique in dithering halftone images , 2005, IEEE Signal Processing Letters.
[17] Ja-Ling Wu,et al. Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..
[18] W. Tsai,et al. Spatial-domain image hiding using image differencing , 2000 .
[19] Xinpeng Zhang,et al. Steganography using multiple-base notational system and human vision sensitivity , 2005, IEEE Signal Process. Lett..
[20] Ja-Chen Lin,et al. Sharing and hiding secret images with size constraint , 2004, Pattern Recognit..
[21] Chun-Shien Lu,et al. Multipurpose watermarking for image authentication and protection , 2001, IEEE Trans. Image Process..
[22] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[23] Steve McLaughlin,et al. Comparative study of textural analysis techniques to characterise tissue from intravascular ultrasound , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[24] Chin-Chen Chang,et al. A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..
[25] Po-Whei Huang,et al. A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..
[26] Hae Yong Kim,et al. A secure authentication watermarking for halftone and binary images , 2004, Int. J. Imaging Syst. Technol..
[27] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[28] Ja-Chen Lin,et al. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..