[1]
|
S. Dumitrescu, X. Wu and Z. Wang, “Detection of LSB Steganography via Sample Pair Analysis,” IEEE Transactions on Signal Process, Vol. 51, 2003, pp. 355-372.
|
[2]
|
A. Ker, “Improved Detection of LSB Steganography in Grayscale Images,” In: J. Fridrich, Ed., Proceedings of the Sixth International Workshop on Information Hiding, Vol. 3200, Springer, Toronto, 2004, pp. 97-115.
doi:10.1007/978-3-540-30114-1_8
|
[3]
|
C. K. Chan and L. M. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Pattern Recognition, Vol. 37, No. 3, 2004, pp. 469-474.
doi:10.1016/j.patcog.2003.08.007
|
[4]
|
J. Mielikainen, “LSB Matching Revisited,” IEEE Signal Processing Letters, Vol. 13, No. 5, 2006, pp. 285-287.
doi:10.1109/LSP.2006.870357
|
[5]
|
A. Westfeld, “F5-a Steganographic Algorithm,” Proceedings of the 4th International Workshop on Information Hiding, Pittsburgh, 25-27 April 2001, pp. 289-302.
|
[6]
|
C.-C. Chang, T. D. Kieu and Y.-C. Chou, “A High Payload Steganographic Scheme Based on (7,4) Hamming Code for Digital Images,” International Symposium on Electronic Commerce and Security, Guangzhou, 3-5 Au- gust 2008, pp. 16-21.
|
[7]
|
Z. X. Yin, C. C. Chang and Y. P. Zhang, “A High Embedding Efficiency Steganography Scheme for Wet Paper Codes,” Proceedings of the 5th International Conference on Information Assurance and Security (IAS 2009), Xi’an, 18-20 August 2009, pp. 611-614.
doi:10.1109/IAS.2009.93
|
[8]
|
Z. X. Yin, C. C. Chang and Y. P. Zhang, “An Information Hiding Scheme Based on (7,4) Hamming Code Oriented Wet Paper Codes,” International Journal of Innovative Computing, Information and Control, Vol. 6, No. 7, 2010, pp. 3121-3130.
|
[9]
|
Y. P. Zhang, J. Jiang, Z. X. Yin and C. C. Xu, “A Method Embedding Email Address into Digital Images,” Proceedings of the 5th International Conference on Computer Science & Education (ICCSE 2010), Heifei, 24-27 August 2010, pp. 346-350.
|
[10]
|
J. Fridrich, M. Goljan, P. Lisonek and D. Soukal, “Writing on Wet Paper,” IEEE Transactions on Signal Processing, Vol. 53, No. 10, Part II, 2005, pp. 3923-3935.
|
[11]
|
C. C. Thien and J. C. Lin, “A Simple and High-Hiding Capacity Method for Hiding Digit-by-Digit Data in Images Based on Modulus Function,” Pattern Recognition, Vol. 36, No. 12, 2003, pp. 2875-2881.
doi:10.1016/S0031-3203(03)00221-8
|
[12]
|
Y. C. Chou, C. C. Chang and K. M. Li, “A Large Payload Data Embedding Technique for Color Images,” Fundamenta Informaticae, Vol. 88, No. 1-2, 2008, pp. 47-61.
|
[13]
|
T. D. Kieu and C. C. Chang, “A High Stego-Image Quality Steganographic Scheme with Reversibility and High Payload Using Multiple Embedding Strategy,” The Journal of Systems and Software, Vol. 82, No. 10, 2009, pp. 1743-1752. doi:10.1016/j.jss.2009.05.028
|
[14]
|
W. Zhang, S. Wang and X. Zhang, “Improving Embedding Efficiency of Covering Codes for Applications in Steganography,” IEEE Communications Letters, Vol. 11, No. 8, 2007, pp. 680-682.
|
[15]
|
X. Zhang and S. Wang, “Efficient Steganographic Embedding by Exploiting Modification Direction,” IEEE Communications Letters, Vol. 10, No. 113, 2006, 781-783.
doi:10.1109/LCOMM.2006.060863
|
[16]
|
C. C. Lin, W. L. Tai and C. C. Chang, “Multilevel Reversible Data Hiding Based on Histogram Modification of Difference Images,” Pattern Recognition, Vol. 41, No. 12, 2008, pp. 3582-3591. doi:10.1016/j.patcog.2008.05.015
|
[17]
|
Y. A. Ho, Y. K. Chan, H. C. Wu and Y. P. Chu, “High Capacity Reversible Data Hiding in Binary Images Using Pattern Substitution,” Computer Standards & Interfaces, Vol. 31, No. 4, 2009, pp. 787-794.
doi:10.1016/j.csi.2008.09.014
|
[18]
|
R. Z. Wang and Y. D. Tsai, “An Image-Hiding Method with High Hiding Capacity Based on Best-Block Matching and k-Means Clustering,” Pattern Recognition, Vol. 40, No. 2, 2007, pp. 398-409.
doi:10.1016/j.patcog.2006.07.015
|
[19]
|
A. Tiwari and M. Sharma, “Comparative Evaluation of Semifragile Watermarking Algorithms for Image Authentication,” Journal of Information Security, Vol. 3, No. 3, 2012, pp. 189-195. doi:10.4236/jis.2012.33023
|
[20]
|
V. H. Gaidhane, V. Singh, Y. V. Hote and M. Kumar, “New Approaches for Image Compression Using Neural Network,” Journal of Intelligent Learning Systems and Applications, Vol. 3, No. 4, 2011, pp. 220-229.
doi:10.4236/jilsa.2011.34025
|
[21]
|
R. Crandall, “Some Notes on Steganography,” Posted on Steganography Mailing List, 1998.
http://os.inf.tu-dresden.de/west-feld/crandall.pdf
|
[22]
|
J. J. Harmsen and W. A. Pearlman, “Steganalysis of Additive Noise Modelable Information Hiding,” In: E. J. Delp and P. W. Wong, Eds., Proceedings of SPIE Security Watermarking Multimedia Contents V, Vol. 5020, San Antonio, 13 June 2003, pp. 131-142.
doi:10.1117/12.476813
|
[23]
|
A. D. Ker, “Quantitative Evaluation of Pairs and RS Steganalysis,” In: E. J. Delp III and Pi. W. Wong, Eds., Proceedings of SPIE—Security, Steganography, and Watermarking of Multimedia Contents VI, SPIE, Vol. 5306, San Jose, 18-22 January 2004, pp. 83-97.
|