[1]
|
A. M. Attar, O. Taheri, S. Sadri, and A. F. Rasoul, “Data hiding in halftone images using error diffusion halftoning with adaptive thresholding,” Electrical and Computer Engineering, CCECE 2006, pp. 2029-2032, 2006.
|
[2]
|
K. H. Jung, K. S. Ha, and K. Y. Yoo, “Data hiding in binary images by pixel-value weighting,” Convergence and Hybrid Information Technology, ICHIT 2008. pp. 262-265, 2008.
|
[3]
|
S. Huang and J. K. Wu, “Optical watermarking for printed document authentication,” Information Forensics and Security, Vol. 2, pp. 164-173, 2007.
|
[4]
|
H. Gou and M. Wu, “Improving embedding payload in binary images with super-pixels,” Image Processing, ICIP 2007, pp. 277-280, 2007.
|
[5]
|
Y. J. Chang and J. C. Lin, “Data hiding using VQ index file,” Intelligence and Security Informatics, ISI 2008, pp. 230-232, 2008.
|
[6]
|
H. B. Zhang and L. Man, “Data hiding in binary line drawing images,” Wavelet Analysis and Pattern Recognition, ICWAPR, pp. 134-140, 2008.
|
[7]
|
J. Chen and T. S. Chen, “A new data hiding method in binary images,” Proceedings of 4th International Symposium on Multimedia Software Engineering, pp. 88-93, 2003.
|
[8]
|
H. Yang and A. C. Kot, “Pattern-based data hiding for binary image authentication by connectivity-preserving,” IEEE Transactions on Multimedia, Vol. 9, No. 3, pp. 475-486, 2007.
|
[9]
|
M. Venkatesan, P. Meenakshidevi, K. Duraiswamy, and K. Thiagarajah, “A new data hiding scheme with quality control for binary images using block parity,” 3rd Inter. Symposium on Information Assurance and Security, pp. 468-471, 2007.
|
[10]
|
M. Wu and B. Liu, “Data hiding in binary image for au-thentication and annotation,” IEEE Transations on Mul-timedia, pp. 528-538, 2004.
|
[11]
|
C. Liu, Y. Dai, and Z. Wang, “A novel information hiding method in binary images,” Journal of Southeast University, 2003.
|
[12]
|
M. Wu, E. Tang, and B. Liu, “Data hiding in digital binary images,” IEEE International Conference on Multimedia & Expo, 2000.
|
[13]
|
E. Koch and J. Zhao, “Embedding robust labels into im-ages for copyright protection,” Proceedings of the Inter-national Congress on Intellectual Property Rights for Spe-cialized Information, Knowledge & New Technologies, 1995.
|
[14]
|
J. T. Brassil, S. H. Low, and N. F. Maxemchuk, “Copyright protection for the electronic distribution of text docu-ments,” Proceedings of IEEE, pp. 1181-1196, 1999.
|
[15]
|
S. H. Low, N. F. Maxemchuk, and A. M. Lapone, “Document identification for copyright protection using centroid detection,” IEEE Transactions on Communications, pp. 372-383, 1998.
|
[16]
|
K. Matsui and K. Tanaka, “Video-steganography: How to secretly embed a signature in a picture,” Proceedings IMA Intellectual Property Project, pp. 187-206, 1994.
|
[17]
|
H. Liang, W. Ran, and X. Nie, “A secure and high capac-ity scheme for binary images,” Proceedings of the ICWAPR, pp. 224-229, 2007.
|