J.-C. Chuang and C.-C. Chang
[1] S. Katzenbeisser & F.A.P. Petitcolas, Information hiding techniques for steganography and digital watermarking (Boston:Artech House, 2000). [2] M. Wu & B. Liu, Multimedia data hiding (New York: Springer-Verlag, 2003). [3] C.C. Chang, J.Y. Hsiao, & C.S. Chan, Finding optimal LSBsubstitution in image hiding by using dynamic programmingstrategy, Pattern Recognition, 36, 2003, 1583–1595. doi:10.1016/S0031-3203(02)00289-3 [4] C.C. Chang, J.C. Chuang, & Y.P. Lai, Hiding data in multitoneimages for data communications, IEE Proc. Vision, Images,and Signal Processing, 151 (2), 2004, 137–145. doi:10.1049/ip-vis:20040045 [5] C.C. Chang, T.S. Chen, & L.Z. Chung, A steganographicmethod based upon JPEG and quantization table modification,Information Sciences, 141 (2), 2002, 123–138. doi:10.1016/S0020-0255(01)00194-3 [6] I.J. Cox, J. Kilian, F.T. Leighton, & T. Shamoon, Securespread spectrum watermarking for multimedia, IEEE Trans.on Image Processing, 6 (12), 1997, 1673–1687. doi:10.1109/83.650120 [7] P.Y. Tsai, Y.C. Hu, & C.C. Chang, A progressive secret revealsystem based on SPIHT image transmission, Signal Processing:Image Communication, 19, 2004, 285–297. doi:10.1016/j.image.2003.10.005 [8] T.S. Chen, C.C. Chang, & M.S. Hwang, A virtual imagecryptosystem based upon vector quantization, IEEE Trans. onImage Processing, 7, 1998, 1485–1488. doi:10.1109/83.718488 [9] H. Noda, J. Spaulading, M.N. Shirazi, & E. Kawaguchi, Application of bit-plane decomposition steganography to JPEG2000encoded image, IEEE Signal Processing Letters, 9 (2), 2003,410–413. doi:10.1109/LSP.2002.806056 [10] J. Spaulading, H. Noda, M.N. Shirazi, & E. Kawaguchi, BPCSsteganography using EZW lossy compressed images, PatternRecognition Letters, 23, 2002, 1579–1587. doi:10.1016/S0167-8655(02)00122-8 [11] E.J. Delp & O.R. Mitchell, Image compression using blocktruncation coding, IEEE Trans. on Communications, 27, 1979,1335–1341. doi:10.1109/TCOM.1979.1094560
Important Links:
Go Back