|
[BEND96] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, Vol. 35, pp. 313-336, 1996. [BIER08] J. Bierbrauer, and J. Fridrich, “Constructing good covering codes for ap-plications in steganography,” Transactions on Data Hiding and Multime-dia Security III, Vol. 4920, pp. 1-22, 2008. [CHAN04] C.K. Chan and L.M. Cheng, “Hiding data in images by simple LSB sub-stitution,” Pattern Recognition, Vol. 37, pp. 469-474, 2004. [CHAN08] C.C. Chang, T.D. Kieu, and Y.C. Chou, “A high payload steganographic scheme based on (7, 4) hamming code for digital images,” Electronic Commerce and Security, 2008. [FRID06] J. Fridrich, and D. Soukal, “Matrix embedding for large payloads,” IEEE Transactions on Information Forensics and Security, vol. 1, pp. 390 - 395, 2006. [FRID07] J. Fridrich, P. Lisoněk, and D. Soukal, “On steganographic embedding efficiency,” Lecture Notes in Computer Science, Vol. 4437, pp. 282-296, 2007. [HUY13] P.T. Huy, N.H. Thanh, C. Kim, and C.N. Yang, “Data-hiding for half-tone images using an improved CPT scheme,” KSII Transactions on In-ternet and Information Systems, Vol. 7, pp. 405-424, 2013. [KER05] A.D. Ker, “Steganalysis of LSB matching in grayscale images,” IEEE Signal Processing Letters, Vol. 12, pp. 441 - 444, 2005. [KIM10] C. Kim, “Data hiding based on compressed dithering images,” Advances in Intelligent Information and Database Systems, Vol. 283, pp. 89-98, 2010. [KIM11] C. Kim, D.K. Shin, and D. Shin, “Data hiding in a halftone image using hamming code (15, 11),” Asian Conference on Intelligent Information and Database Systems, Vol. 6592, pp. 372-381, 2011. [KIM16] C. Kim, and C.N. Yang, “Data hiding based on overlapped pixels using Hamming code,” Multimedia Tools and Applications, Vol. 75, pp. 15651-15663, 2016. [MIEL06] J. Mielikainen, “LSB matching revisited,” IEEE Signal Processing Letters, Vol. 13, pp. 285 - 287, 2006. [STAN17] C.A. Stanley, “Pairs of values and the chi-squared attack,” http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.146.5017, pp. 1-45, accessed 5 July 2017. [TSEN02] Y.C. Tseng, Y.Y. Chen, and H.K. Pan, “A secure data hiding scheme for binary images,” IEEE Transactions on Communications, Vol. 50, pp. 1227 - 1231, 2002. [WEB01] R. Crandall, http://dde.binghamton.edu/download/Crandall/matrix.pdf. (Accessed31 May 2017). [WEB02] Image database ref, http://sipi.usc.edu/database/database.php?volume =misc. (Accessed31 May 2017). [WEST01] A. Westfeld, “F5: a steganographic algorithm,” International Workshop on Information Hiding, Vol. 2137, pp. 289-302, 2001. [XIA14] Z. Xia, X. Wang, X. Sun, and B. Wang, “Steganalysis of least significant bit matching using multi-order differences,” Security and Communication Networks, Vol. 7, pp. 1283–1291, 2014. [XIA16] Z. Xia, X. Wang, X. Sun, Q. Liu, and N. Xiong, “Steganalysis of LSB matching using differences between nonadjacent pixels,” Multimedia Tools and Applications, Vol. 75, pp. 1947–1962, 2016. [YANG11] C.N. Yang, G.C. Ye, and C. Kim, “Data hiding in halftone images by XOR block-wise operation with difference minimization,” KSII Transac-tions on Internet and Information Systems, Vol. 5, February, 2013. [YANG17] C.N. Yang, S.C. Hsu, and C. Kim, “Improving stego image quality in im-age interpolation based data hiding,” Computer Standards & Interfaces, Vol. 50, pp. 209-215, 2017. [ZHAN06] X. Zhang, and S. Wang, “Efficient steganographic embedding by ex-plo-iting modification direction,” IEEE Communications Letters, Vol. 10, pp. 781-783, 2006. [ZHAN07A] X. Zhang, W. Zhang, and S. Wang, “Efficient double layered ste-gano-graphic embedding,” Electronics Letters, Vol. 43, pp. 482-483, 2007. [ZHAN07B] W. Zhang, S. Wang, and X. Zhang, “Improving embedding efficiency of covering codes for applications in steganography,” IEEE Communications Letters, Vol. 11, pp.680-682, 2007. [ZHAN12] R. Zhang, V. Sachnev, M. Bakke Botnan, H.J. Kim, and J. Heo, “An effi-cient embedder for BCH coding for steganography,” IEEE Transactions on Information Theory, Vol. 58, pp. 7272-7279, 2012. [ZHAN13] Y. Zhang, J. Jiang, Y. Zha, H. Zhang, and S. Zhao, “Research on em-bed-ding capacity and efficiency of information hiding based on digital images,” International Journal of Intelligence Science, Vol. 3, pp. 77-85, 2013.
|