|
[FRID01] J. Fridrich, M. Golijan, R. Du, “Reliable detection of LSB steganography in grayscale and color images.” In: ACM Workshop on Multimedia and Security, pp. 27-30, 2001. [JEDW89] J. Jedwab, C.J. Mitchell. “Minimum weight modified signed-digit representations and fast exponentiation.” Electronics Letters, Vol.25, no.17, pp.1171-1172, 1989. [KUO13] W.C. Kuo, C.C. Wang. “Data hiding based on generalized exploiting modification direction method.” Image Science Journal, Vol.61, no.6, pp.484-490, 2013. [KUO14] W.C. Kuo, Y.H. Chen, C.T. Chuang. “High-capacity steganographic method based on division arithmetic and generalized exploiting modification direction, ” Journal of Information Hiding and Multimedia Signal Processing, Vol.5, no.2, pp.213-222, 2014. [KUO16] W.C. Kuo, C.C. Wang, H.C. Hou. “Signed digit data hiding scheme, ” Information Processing Letters, Vol.116, no.2, pp.183-191, 2016. [LEE07] C.F. Lee, Y.R. Wang, C.C. Chang, “A steganographic method with high embedding capacity by improving exploiting modification direction.” In: the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.497-500, 2007. [WANG10] J. Wang, Y. Sun, H. Xu, K. Chen, H.J. Kim, S.H. Joo. “An improved section-wise exploiting modification direction method, ” Signal Processing, Vol.90, no.11, pp.2954-2964, 2010. [WANG12] X.T. Wang, C.C. Chang, C.C. Lin, M.C. Li, “A novel multi-group exploiting direction method based on switch map, ” Signal Processing, Vol.92, no.6, pp.1525-1535, 2012. [WANG17] C.C. Wang, W.C. Kuo, Y.C.Huang, L.C. Wuu. “A high capacity data hiding scheme based on re-adjusted GEMD, ” Multimedia Tools and Applications, Vol.8, pp.1-15, 2017. [ZHAN06] X. Zhang, S. Wang. “Efficient steganographic embedding by exploiting modification direction.” IEEE Communication Letters, Vol.10. no.11, pp.781-783, 2006.
|