[1]
|
C.-C. Thien and J.-C. Lin, “A Simple and High-Hiding Capacity Method for Hiding Digit-by-Digit Data in Images Based on Modulus Function,” Pattern Recognition, Vol. 36, No. 12, 2003, pp. 2875-2881.
doi:10.1016/S0031-3203(03)00221-8
|
[2]
|
C.-K. Chan and L. M. Cheng, “Hiding Data in Images by Simple LSB Substitution,” Pattern Recognition, Vol. 37, No. 3, 2004, pp. 469-474.
doi:10.1016/j.patcog.2003.08.007
|
[3]
|
C.-C. Chang, J.-Y. Hsiao and C.-S. Chan, “Finding Optimal Least-Significant Bit Substitution in Image Hiding by Dynamic Programming Strategy,” Pattern Recognition, Vol. 36, No. 7, 2003, pp. 1583-1595.
doi:10.1016/S0031-3203(02)00289-3
|
[4]
|
C.-C. Thien and J.-C. Lin, “A Simple and High-Hiding Capacity Method for Hiding Digit-by-Digit Data in Images Based on Modulus Function,” Pattern Recognition, Vol. 36, No. 12, 2003, pp. 2875-2881.
doi:10.1016/S0031-3203(03)00221-8
|
[5]
|
R.-Z. Wang, C.-F. Lin and J.-C. Lin, “Image Hiding by Optimal LSB Substitution and Genetic Algorithm,” Pattern Recognition, Vol. 34, No. 3, 2001, pp. 671-683.
doi:10.1016/S0031-3203(00)00015-7
|
[6]
|
C.-C. Chang, T.-S. Chen and L.-Z. Chung, “A Steganographic Method Based upon JPEG and Quantization Table Modification,” Information Sciences, Vol. 141, No. 12, 2002, pp. 123-138.
doi:10.1016/S0020-0255(01)00194-3
|
[7]
|
M. Iwata, K. Miyake and A. Shiozaki, “Digital Steganography Utilizing Features of JPEG Images,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E87-A, No. 4, 2004, pp. 929-936.
|
[8]
|
H. Noda, J. Spaulding, M. N. Shirazi and E. Kawaguchi, “Application of Bit-Plane Decomposition Steganography to JPEG2000 Encoded Images,” IEEE Transactions on Signal Processing Letters, Vol. 9, No. 12, 2002, pp. 410-413. doi:10.1109/LSP.2002.806056
|
[9]
|
T. Liu and Z.-D. Qiu, “A DWT-Based Color Image Steganography Scheme,” Proceedings of the International Conference on Signal Processing, Beijing, 26-30 August 2002, pp. 1568-1571. doi:10.1109/ICOSP.2002.1180096
|
[10]
|
R. R. Ni and Q. Q. Ruan, “Embedding Information into Color Images Using Wavelet,” Proceedings of the International Conference on Computers, Communications, Control and Power Engineering of the IEEE TENCON, Beijing, 28-31 October 2002, pp. 598-601.
doi:10.1109/TENCON.2002.1181346
|
[11]
|
M.-H. Lin, Y.-C. Hu and C.-C. Chang, “Both Color and Gray Scale Secret Images Hiding in a Color Image,” International Journal of Pattern Recognition and Artificial Intelligence, Vol. 16, No. 6, 2002, pp. 697-713.
doi:10.1142/S0218001402001903
|
[12]
|
W.-S. Kim and R.-H. Park, “Color Image Palette Construction Based on the HSI Color System for Minimizing the Reconstruction Error,” Proceedings of the International Conference on Image Processing of the IEEE, Lausanne, 16-19 September 1996, pp. 1041-1044.
doi:10.1109/ICIP.1996.561017
|
[13]
|
J. Fridrich, “Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes,” Proceedings of the 6th International Conference on Information Hiding, Toronto, 23-25 May 2004, pp. 67-81. doi:10.1007/978-3-540-30114-1_6
|
[14]
|
Y. Q. Shi, C. C. Chen and W. Chen, “A Markov Process Based Approach to Effective Attacking JPEG Steganography,” Proceedings of the 8th International Conference on Information Hiding, Alexandria, 10-12 July 2006, pp. 249-264.
|
[15]
|
Z.-M. He, W. W. Y. Ng, P. P. K. Chan and D. S. Yeung, “Steganography Detection Using Localized Generalization Error Model,” Proceedings of the International Conference on Systems Man and Cybernetics of the IEEE SMC, Istanbul, 10-13 October 2010, pp. 1544-1549.
doi:10.1109/ICSMC.2010.5642331
|