[1]
|
Cheng Wei-Dong, Huang Ji-Wu, Liu Hong-Mei. A 3D-DCT-Based information hiding algorithm for color images. Acta Automatica Sinica, 2003, 29 (2): 258-266(程卫东, 黄继武, 刘红梅. 一种基于3D-DCT的彩色图像信息隐藏算法. 自动化学报, 2003, 29(2): 258-266)
|
[2]
|
Filler T, Fridrich J. Design of adaptive steganographic schemes for digital images. In: Proceedings of the 8th Electronic Imaging, Media Watermarking, Security, and Forensics. San Francisco, CA: SPIE, 2011. 1-14
|
[3]
|
Fridrich J, Kodovský J, Goljan M, Holub V. Steganalysis of content-adaptive steganography in spatial domain. In: Proceedings of the 13th International Conference on Information Hiding. Prague, Czech Republic: LNCS, 2011. 102-117
|
[4]
|
Fridrich J, Goljan M, Lisonek P, Soukal D. Writing on wet paper. IEEE Transactions on Signal Processing, 2005, 53(10): 3923-3935
|
[5]
|
Filler T, Judas J, Fridrich J. Minimizing embedding impact in steganography using trellis-coded quantization. In: Proceedings of the 7th Electronic Imaging, Media Forensics and Security. San Jose, USA: SPIE, 2009. 1-14
|
[6]
|
Lu Y F, Li X L, Yang B. A secure steganography: noisy region embedding. In: Proceedings of 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Kyoto, Japan: IEEE, 2009. 1046-1051
|
[7]
|
Zhang X P, Wang S Z. Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Processing Letters, 2005, 12(1): 67-70
|
[8]
|
Singh Kh M, Singh L S, Singh A B, Devi Kh S. Hiding secret message in edges of the image. In: Proceedings of the 2007 International Conference on Information and Communication Technology. Dhaka, Bangladesh: IEEE, 2007. 238-241
|
[9]
|
Yang C H, Weng C Y, Wang S J, Sun H M. Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Transactions on Information Forensics and Security, 2008, 3(3): 488-497
|
[10]
|
Luo W Q, Huang F J, Huang J W. Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 201-214
|
[11]
|
Liu G J, Liu W W, Dai Y W, Lian S G. An adaptive matrix embedding for image steganography. In: Proceedings of the 3rd International Conference on Multimedia Information Networking and Security. Shanghai, China: IEEE, 2011. 642-646
|
[12]
|
Fridrich J, Goljan M, Soukal D. Efficient wet paper codes. In: Proceedings of the 7th International Workshop on Information Hiding. Barcelona, Spain: LNCS, 2005. 204-218
|
[13]
|
Fridrich J. Minimizing the embedding impact in steganography. In: Proceedings of the 8th Workshop on ACM Multimedia and Security. Geneva, Switzerland: ACM, 2006. 2-10
|
[14]
|
Filler T, Fridrich J. Design of adaptive steganographic schemes for digital images. In: Proceedings of the 8th Electronic Imaging, Media Watermarking, Security, and Forensics. San Francisco, CA: SPIE, 2011. 24-26
|
[15]
|
Schaefer G, Stich M. UCID: an uncompressed color image database. In: Proceedings of the 2nd Storage and Retrieval Methods and Applications for Multimedia. San Jose, USA: SPIE, 2003. 472-480
|
[16]
|
Cai K W, Li X L, Zeng T Y, Yang B, Lu X Q. Reliable histogram features for detecting LSB matching. In: Proceedings of the 17th International Conference on Image Processing. Hong Kong, China: IEEE, 2010. 1761-1764
|
[17]
|
Pevny T, Bas P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 215-224
|
[18]
|
Zhang X, Zhang W, Wang S. Efficient double-layered steganographic embedding. IET Electronics Letters, 2007, 43(8): 482-483
|
[19]
|
Zhang W M, Zhang X P, Wang S Z. Near-optimal codes for information embedding in gray-scale signals. IEEE Transactions on Information Theory, 2010, 55(3): 1262-1270
|