[1]
|
T. Moerland, “Stegnography and Steganalysis,” Leiden Institute of Advanced Computing Science, 2003.
www.liacs.nl/home/ tmoerl/privtech.pdf
|
[2]
|
D. Artz, “Digital Stegnography: Hiding Data within Data,” IEEE Internet Computing Journal, Vol. 5, No. 3, 2001, pp. 75-80.
|
[3]
|
T. Handel and M. Sandford, “Hiding Data in the OSI Network Model,” Proceedings of the 1st International Workshop on Information Hiding, Vol. 1174, 1996, pp. 23-38. http://dx.doi.org/10.1007/3-540-61996-8_29
|
[4]
|
K. Solanki, K. Sullivan and U. Madhow, Eds., “Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes,” Lecture Notes in Computer Science, Vol. 5284, 2008, pp. 60-71.
|
[5]
|
K. Ahsan and D. Kundur, “Practical Data Hiding in TCP/ IP”, Proceedings of the Workshop on Multimedia Security at ACM Multimedia, 2002.
|
[6]
|
R. J. Anderson and F. A. P. Petitcolas, “On the Limits of Stegnography,” IEEE Journal of Selected Areas in Communications, Vol. 16, No. 4, 1998, pp. 474-481.
http://dx.doi.org/10.1109/49.668971
|
[7]
|
R. Crandall, “Some Notes on Stegnography,” Steganography Mailing List, 1998.
http://os.inf.tu-dresden.de/westfeld/crandall.pdf
|
[8]
|
F. Galand and G. Kabatiansky, “Information Hiding by Coverings,” Proceedings of the IEEE Information Theory Workshop, 2004, pp. 151-154.
|
[9]
|
K. Cabeen and P. Gent, “Image Compression and Discrete Cosine Transform,” College of Redwoods.
http://online.redwoods.cc.ca.us/instruct/darnold/LAPROJ/Fall98/PKen/dct.pdf
|
[10]
|
A. B. Watson, “Image Compression Using the Discrete Cosine Transform,” NASA Ames Research Center, Mathematica Journal, Vol. 4, No. 1, 1994, pp. 81-88.
|
[11]
|
J. Fridrich, M. Goljan and R. Du, “Detecting LSB Steganography in Color and Gray-Scale Images,” Magazine of IEEE Multimedia, Special Issue on Multimedia and Security, Vol. 8, No. 4, 2001, pp. 22-28.
|
[12]
|
J. Bierbrauer and J. Fridrich, “Constructing Good Covering Codes for Applications in Stegnography,” Transactions on Data Hiding and Multimedia Security, Springer, Heidelberg, 2007. http://www.math.mtu.edu/jbierbra/
|
[13]
|
N. Provos and P. Honeyman, “Hide and Seek: An Introduction to Stegnography,” IEEE Security & Privacy, Vol. 1, No. 3, 2003, pp. 32-44.
|
[14]
|
M. A. Shourian, R. C. Jain and Y.-S. Ho, “Dithered Quantization for Image Data Hiding in the DCT Domain,” Proceedings of IST 2003, 16-18 August 2003, Isfahan, pp. 171-175.
|
[15]
|
J. R. Krenn, “Stegnography and Steganalysis,” 2004.
|
[16]
|
R.-J. Hwang, T. K. Shih and C.-H. Kao, “A Lossy Compression Tolerant Data Hiding Method Based on JPEG and VQ,” Journal of Internet Technology, Vol. 5, No. 3, 2004, pp. 171-178
|
[17]
|
H.-W. Tseng and C.-C. Chang, “High Capacity Data Hiding in JPEG Compressed Images,” Informatica, Vol. 15, No. 1, 2004, pp. 127-142.
|
[18]
|
Y. Park, H. Kang, K. Yamaguchi and K. Kobayashi, “Integrity Verification of Secret Information in Image Steganography,” Symposium on Information Theory and Its Applications, Hakodate, 2006.
|
[19]
|
N. Deshpande, K. Sneha and D. Jacobs, “Implementation of LSB Stegnography and Its Evaluation for Various Bits,” 1st International Conference on Digital Information Management, Bangalore, 6 December 2006, pp. 173-178. http://dx.doi.org/10.1109/ICDIM.2007.369349
|
[20]
|
M. Chaumont and W. Puech, “DCT-Based Data Hiding Method to Embed the Color Information in a JPEG Grey Level Image,” 14th European Signal Processing Conference (EUSIPCO 2006), Florence, 4-8 September, 2006.
|
[21]
|
A. Jain and I. S. Gupta, “A JPEG Compression Resistant Stegnography Scheme for Raster Graphics Images,” IEEE Region 10 Conference of TENCON, 30 October-2 November 2007, Taipei, pp. 1-4.
|
[22]
|
K. Wong, X. J. Qi and K. Tanaka, “A DCT Based Mod4 Stegnography Method,” Signal Processing, Vol. 87, No. 6, 2007, pp. 1251-1263.
http://dx.doi.org/10.1016/j.sigpro.2006.10.014
|
[23]
|
T. Ishida, K. Yamawaki, H. Noda and M. Niimi, “Performance Improvement of JPEG2000 Stegnography Using QIM,” Journal of Communication and Computer, Vol. 6, No. 1, 2009.
|
[24]
|
C.-T. Tsai, C. Liaw, Y.-H. Liao and C.-H. Ko, “Concealing Information in Image Mosaics Based on Tile Image Features,” Journal of the Chinese Institute of Engineers, Vol. 34, No. 3, 2011, pp. 429-440.
http://dx.doi.org/10.1080/02533839.2011.565618
|
[25]
|
C.-M. Wang and P.-C. Wang, “Data Hiding on Point-Sampled Geometry,” Journal of the Chinese Institute of Engineers, Vol. 29, No. 3, 2006, pp. 539-542.
|
[26]
|
D. Bhattacharyya, T.-H. Kim and P. Dutta, “A Method of Data Hiding in Audio Signal,” Journal of the Chinese Institute of Engineers, Vol. 35, No. 5, 2012, pp. 523-528.
http://dx.doi.org/10.1080/02533839.2012.679054
|
[27]
|
S. Khan, M. H. Yousaf and M. J. Akram, “Implementation of Variable Least Significant Bits Stegnography Using Decreasing Distance Decreasing Bits Algorithm,” International Journal of Computer Science Issues, Vol. 8, No. 6, 2011.
|
[28]
|
S. Khan and M. H. Yousaf, “Implementation of VLSB Stegnography Using Modular Distance Technique,” Innovations and Advances in Computer, Information, Systems Sciences, and Engineering Lecture Notes in Electrical Engineering, Vol. 152, 2013, pp. 511-525.
http://dx.doi.org/10.1007/978-1-4614-3535-8_43
|
[29]
|
E. Walia and P. J. Navdeep, “An Analysis of LSB & DCT Based Stegnography,” Global Journal of Computer Science and Technology, Vol. 10, No. 1, 2010, pp. 4-8.
|
[30]
|
E. Neuman, “MATLA B Tutorials,” Department of Mathematics, Board of Trustees, Southem Illinois University, Carbondale, 2009.
|
[31]
|
R. C. Gonzalez and R. E. Woods, “Digital Image Processing,” 2nd Edition, Prentice-Hall, 2002.
|