23.3.8 Image Hiding, Data Hiding, Steganography, Steganalysis

Chapter Contents (Back)
Steganography. Steganalysis. Data Hiding. Image Hiding. Many of the more specific papers are separated out: See also Data Hiding, Steganography, LSB, Least Significant Bit. See also Halftone Images, Compressed Images: Image Hiding, Data Hiding, Steganography. See also Video Data Hiding, Data Hiding in Video, Video Steganography.

Xydeag, C.S., Kostic, B., Steele, R.,
Embedding Data into Pictures by Modulo Masking,
Commun(32), 1984, pp. 56-69. BibRef 8400

Wu, D.C.[Da-Chun], Tsai, W.H.[Wen-Hsiang],
Spatial-domain image hiding in using image differencing,
VISP(147), No. 1, February 2000, pp. 29. 0005
BibRef

Wu, D.C.[Da-Chun], Tsai, W.H.[Wen-Hsiang],
A steganographic method for images by pixel-value differencing,
PRL(24), No. 9-10, June 2003, pp. 1613-1626.
WWW Version. 0304
BibRef

Lee, I.S.[I-Shi], Tsai, W.H.[Wen-Hsiang],
Data Hiding in Binary Images with Distortion-Minimizing Capabilities by Optimal Block Pattern Coding and Dynamic Programming Techniques,
IEICE(E90-D), No. 8, August 2007, pp. 1142-1150.
DOI Link 0708
BibRef

Lee, I.S.[I-Shi], Tsai, W.H.[Wen-Hsiang],
Data hiding in grayscale images by dynamic programming based on a human visual model,
PR(42), No. 7, July 2009, pp. 1604-1611.
Elsevier DOI Link 0903
Data hiding; Grayscale image; Human visual system; Block pattern encoding; Dynamic programming BibRef

Li, Y.L.[Ya-Lin], Tsai, W.H.[Wen-Hsiang],
New Image Steganography via Secret-Fragment-Visible Mosaic Images by Nearly-Reversible Color Transformation,
ISVC11(II: 64-74).
Springer DOI Link 1109
BibRef

Lee, Y.K.[Yeuan-Kuen], Chen, L.H.[Ling-Hwei],
High capacity image steganographic model,
VISP(147), No. 3, 2000, pp. 288. 0008
BibRef

Wang, R.Z.[Ran-Zan], Chen, Y.S.[Yeh-Shun],
High-payload image steganography using two-way block matching,
SPLetters(13), No. 3, March 2006, pp. 161-164.
IEEE DOI Link 0604
BibRef

Wang, R.Z.[Ran-Zan], Su, C.H.[Chin-Hui],
Secret image sharing with smaller shadow images,
PRL(27), No. 6, 15 April 2006, pp. 551-555.
WWW Version. Secret sharing; Image sharing; Shadow image; Data hiding 0604
BibRef

Lin, Y.Y.[Yung-Yi], Wang, R.Z.[Ran-Zan],
Scalable Secret Image Sharing With Smaller Shadow Images,
SPLetters(17), No. 1, January 2010, pp. 245-248.
IEEE DOI Link 1001
BibRef

Wang, R.Z.[Ran-Zan], Chien, Y.F.[Yin-Fang], Lin, Y.Y.[Yung-Yi],
Scalable user-friendly image sharing,
JVCIR(21), No. 7, October 2010, pp. 751-761.
Elsevier DOI Link 1003
Image sharing; Secret sharing; Secret image sharing; User-friendly shadow image; Progressive reconstruction; Scalable sharing; Visual cryptography; Visual secret sharing BibRef

Fridrich, J.[Jessica], Goljan, M.[Miroslav], Du, R.[Rui],
Lossless Data Embedding: New Paradigm in Digital Watermarking,
JASP(2002), No. 2, 2002, pp. 185-196. 0202
BibRef

Huang, J.W.[Ji-Wu], Shi, Y.Q.[Yun Q.],
Reliable information bit hiding,
CirSysVideo(12), No. 10, October 2002, pp. 916-920.
IEEE Top Reference. 0212
BibRef

Avcibas, I.[Ismail], Memon, N.[Nasir], Sankur, B.[Bülent],
Steganalysis using image quality metrics,
IP(12), No. 2, February 2003, pp. 221-229.
IEEE DOI Link 0304
BibRef

Avcibas, I.[Ismail], Kharrazi, M.[Mehdi], Memon, N.[Nasir], Sankur, B.[Bülent],
Image Steganalysis with Binary Similarity Measures,
JASP(2005), No. 17, 2005, pp. 2749-2757.
WWW Version. 0603
BibRef
Earlier: A1, A3, A4 only: ICIP02(III: 645-648).
IEEE DOI Link 0210
See also Steganalytic Features for JPEG Compression-Based Perturbed Quantization. BibRef

Bayram, S.[Sevinc], Dirik, A.E.[Ahmet Emir], Sencar, H.T.[Husrev Taha], Memon, N.[Nasir],
An Ensemble of Classifiers Approach to Steganalysis,
ICPR10(4376-4379).
IEEE DOI Link 1008
BibRef

Kharrazi, M., Sencar, H.T., Memon, N.,
Cover Selection for Steganographic Embedding,
ICIP06(117-120).
IEEE DOI Link 0610
BibRef

Chandramouli, R.[Rajarathnam], Kharrazi, M.[Mehdi], Memon, N.[Nasir],
Image Steganography and Steganalysis: Concepts and Practice,
DW03(35-49).
WWW Version. 0405
BibRef

Dumitrescu, S., Wu, X.L.[Xiao-Lin], Memon, N.,
On steganalysis of random LSB embedding in continuous-tone images,
ICIP02(III: 641-644).
IEEE DOI Link 0210
BibRef

Kim, H.J.[Hyoung Joong], Choi, Y.H.[Yong Hee],
A novel echo-hiding scheme with backward and forward kernels,
CirSysVideo(13), No. 8, August 2003, pp. 885-889.
IEEE Abstract. 0309
BibRef

Thien, C.C.[Chih-Ching], Lin, J.C.[Ja-Chen],
A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function,
PR(36), No. 12, December 2003, pp. 2875-2881.
WWW Version. 0310
BibRef

Thien, C.C., Lin, J.C.[Ja-Chen],
An image-sharing method with user-friendly shadow images,
CirSysVideo(13), No. 12, December 2003, pp. 1161-1169.
IEEE Abstract. 0402
BibRef

Jain, A.K.[Anil K.], Uludag, U.[Umut],
Hiding Biometric Data,
PAMI(25), No. 11, November 2003, pp. 1494-1498.
IEEE Abstract. 0311
Biometrics. How to establish the authenticity of the biometric data itself. Biometric data is not replaceable or secret. Hide the data (eigen face coefficients or fingerprints) itself in images. BibRef

Jain, A.K., Uludag, U., Hsu, R.L.[Rein-Lien],
Hiding a face in a fingerprint image,
ICPR02(III: 756-759).
IEEE DOI Link 0211
BibRef

Zhang, X.P.[Xin-Peng], Wang, S.Z.[Shuo-Zhong],
Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security,
PRL(25), No. 3, February 2004, pp. 331-339.
WWW Version. 0401
BibRef

Zhang, X.P.[Xin-Peng], Wang, S.Z.[Shuo-Zhong],
Steganography using multiple-base notational system and human vision sensitivity,
SPLetters(12), No. 1, January 2005, pp. 67-70.
IEEE Abstract. 0501
BibRef

Zhang, X.P.[Xin-Peng], Wang, S.Z.[Shuo-Zhong],
Dynamical running coding in digital steganography,
SPLetters(13), No. 3, March 2006, pp. 165-168.
IEEE DOI Link 0604
BibRef

Zhang, X.P.[Xin-Peng], Wang, S.Z.[Shuo-Zhong], Zhou, Z.Y.[Zhen-Yu],
Multibit Assignment Steganography in Palette Images,
SPLetters(15), No. 1, 2008, pp. 553-556.
IEEE DOI Link 0811
BibRef

Wu, M.Y.[Mei-Yi], Ho, Y.K.[Yu-Kun], Lee, J.H.[Jia-Hong],
An iterative method of palette-based image steganography,
PRL(25), No. 3, February 2004, pp. 301-309.
WWW Version. 0401
BibRef
Earlier:
A Method to Improve the Stego-Image Quality for Palette-Based Image Steganography,
DW03(483-496).
WWW Version. 0405
BibRef

Ho, Y.K.[Yu-Kuen], Wu, M.Y.[Mei-Yi],
Robust object-based watermarking scheme via shape self-similarity segmentation,
PRL(25), No. 15, November 2004, pp. 1673-1680.
WWW Version. 0411
BibRef

Yang, C.N.[Ching-Nung],
New visual secret sharing schemes using probabilistic method,
PRL(25), No. 4, March 2004, pp. 481-494.
WWW Version. 0402
BibRef

Yang, C.N.[Ching-Nung], Chen, T.S.[Tse-Shih],
Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion,
PRL(26), No. 2, 15 January 2005, pp. 193-206.
WWW Version. 0501
BibRef
And:
Extended Visual Secret Sharing Schemes with High-Quality Shadow Images Using Gray Sub Pixels,
ICIAR05(1184-1191).
Springer DOI Link 0509
BibRef
Earlier:
New Aspect Ratio Invariant Visual Secret Sharing Schemes Using Square Block-Wise Operation,
ICIAR05(1167-1174).
Springer DOI Link 0509
BibRef

Yang, C.N.[Ching-Nung], Chen, T.S.[Tse-Shih],
Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation,
PR(39), No. 7, July 2006, pp. 1300-1314.
WWW Version. 0606
BibRef
And:
Visual Secret Sharing Scheme: Improving the Contrast of a Recovered Image Via Different Pixel Expansions,
ICIAR06(I: 468-479).
Springer DOI Link 0610
Visual secret sharing; Visual cryptography; Secret image sharing BibRef

Bastug, A., Sankur, B.,
Improving the Payload of Watermarking Channels via LDPC Coding,
SPLetters(11), No. 2, February 2004, pp. 90-92.
IEEE Abstract. 0402
BibRef

Wu, Y.S.[Yu-Shan], Thien, C.C.[Chih-Ching], Lin, J.C.[Ja-Chen],
Sharing and hiding secret images with size constraint,
PR(37), No. 7, July 2004, pp. 1377-1385.
WWW Version. 0405
BibRef

Chang, C.C., Chuang, J.C., Lai, Y.P.,
Hiding data in multitone images for data communications,
VISP(151), No. 2, April 2004, pp. 137-145.
IEEE Abstract. 0406
BibRef

Chang, C.C.[Chin-Chen], Chen, G.M.[Guei-Mei], Lin, M.H.[Min-Hui],
Information hiding based on search-order coding for VQ indices,
PRL(25), No. 11, August 2004, pp. 1253-1261.
WWW Version. 0409
BibRef

Chang, C.C.[Chin-Chen], Tseng, H.W.[Hsien-Wen],
A steganographic method for digital images using side match,
PRL(25), No. 12, September 2004, pp. 1431-1437.
WWW Version. 0409
BibRef

Lu, T.C.[Tzu-Chuen], Chang, C.C.[Chin-Chen],
Lossless nibbled data embedding scheme based on difference expansion,
IVC(26), No. 5, May 2008, pp. 632-638.
WWW Version. 0803
Lossless data embedding; Difference expansion; Nibble; Arithmetic coding; Prediction by partial matching BibRef

Chang, C.C.[Chin-Chen], Lin, C.Y.[Chih-Yang], Fan, Y.H.[Yi-Hsuan],
Lossless data hiding for color images based on block truncation coding,
PR(41), No. 7, July 2008, pp. 2347-2357.
WWW Version. 0804
See also extended difference expansion algorithm for reversible watermarking, An. Reversible data hiding; Steganography; Block truncation coding (BTC); Genetic algorithm (GA) BibRef

Lin, C.C.[Chia-Chen], Tai, W.L.[Wei-Liang], Chang, C.C.[Chin-Chen],
Multilevel reversible data hiding based on histogram modification of difference images,
PR(41), No. 12, December 2008, pp. 3582-3591.
WWW Version. 0810
Data hiding; Multilevel hiding strategy; Reversibility; Histogram BibRef

Tai, W.L.[Wei-Liang], Yeh, C.M., Chang, C.C.[Chin-Chen],
Reversible Data Hiding Based on Histogram Modification of Pixel Differences,
CirSysVideo(19), No. 6, June 2009, pp. 906-910.
IEEE DOI Link 0906
BibRef

Lin, P.Y.[Pei-Yu], Lee, J.S.[Jung-San], Chang, C.C.[Chin-Chen],
Distortion-free secret image sharing mechanism using modulus operator,
PR(42), No. 5, May 2009, pp. 886-895.
Elsevier DOI Link 0902
Secret sharing; Distortion-free; Rabin's signature; Modulus operator; Cheater detection BibRef

Qin, C.[Chuan], Chang, C.C.[Chin-Chen], Liao, L.T.[Li-Ting],
An adaptive prediction-error expansion oriented reversible information hiding scheme,
PRL(33), No. 16, 1 December 2012, pp. 2166-2172.
Elsevier DOI Link 1210
Reversible data hiding; Prediction-error expansion; Embedding rate; Visual quality BibRef

Wang, Y.L.[Yu-Lin], Pearmain, A.[Alan],
Blind image data hiding based on self reference,
PRL(25), No. 15, November 2004, pp. 1681-1689.
WWW Version. 0411
See also Blind MPEG-2 Video Watermarking Robust Against Geometric Attacks: A Set of Approaches in DCT Domain. BibRef

Solanki, K., Jacobsen, N., Madhow, U., Manjunath, B.S., Chandrasekaran, S.,
Robust image-adaptive data hiding using erasure and error correction,
IP(13), No. 12, December 2004, pp. 1627-1639.
IEEE DOI Link 0412
BibRef

Sullivan, K., Solanki, K., Manjunath, B.S., Madhow, U., Chandrasekaran, S.,
Determining Achievable Rates for Secure, Zero Divergence, Steganography,
ICIP06(121-124).
IEEE DOI Link 0610
BibRef
And: A2, A1, A4, A3, A5:
Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration,
ICIP06(125-128).
IEEE DOI Link 0610
BibRef

Solanki, K., Dabeer, O., Manjunath, B.S., Madhow, U., Chandrasekaran, S.,
A joint source-channel coding scheme for image-in-image data hiding,
ICIP03(II: 743-746).
IEEE Abstract. 0312
BibRef

Tsai, C.L.[Chang-Lung], Chiang, H.F.[Huei-Fen], Fan, K.C.[Kuo-Chin], Chung, C.D.[Char-Dir],
Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mechanism,
PR(38), No. 11, November 2005, pp. 1993-2006.
WWW Version. 0509
BibRef

Brisbane, G., Safavi-Naini, R., Ogunbona, P.,
High-capacity steganography using a shared colour palette,
VISP(152), No. 6, December 2005, pp. 787-792.
DOI Link 0512
BibRef

Kamstra, L., Heijmans, H.J.A.M.,
Reversible Data Embedding Into Images Using Wavelet Techniques and Sorting,
IP(14), No. 12, December 2005, pp. 2082-2090.
IEEE DOI Link 0512
BibRef

Alghoniemy, M., Tewfik, A.H.,
Progressive Quantized Projection Approach to Data Hiding,
IP(15), No. 2, February 2006, pp. 459-472.
IEEE DOI Link 0602
See also Geometric Invariance in image watermarking. BibRef

Lan, T.H., Tewfik, A.H.,
A Novel High-Capacity Data-Embedding System,
IP(15), No. 8, August 2006, pp. 2431-2440.
IEEE DOI Link 0606
BibRef

Wu, Y.T., Shih, F.Y.,
Genetic Algorithm Based Methodology for Breaking the Steganalytic Systems,
SMC-B(36), No. 1, February 2006, pp. 24-31.
IEEE DOI Link 0602
See also Enhancement of image watermark retrieval based on genetic algorithms. BibRef

Li, S.L.[Suk-Ling], Leung, K.C.[Kai-Chi], Cheng, L.M., Chan, C.K.[Chi-Kwong],
A novel image-hiding scheme based on block difference,
PR(39), No. 6, June 2006, pp. 1168-1176.
WWW Version. 0604
BibRef
Earlier: A4, A3, A2, A1:
Image hiding based on block difference,
ICARCV04(II: 968-972).
IEEE DOI Link 0412
Image hiding; Block difference BibRef

Ni, Z.C.[Zhi-Cheng], Shi, Y.Q.[Yun-Qing], Ansari, N., Su, W.[Wei],
Reversible data hiding,
CirSysVideo(16), No. 3, March 2006, pp. 354-362.
IEEE DOI Link 0604
BibRef

Ni, Z.C.[Zhi-Cheng], Shi, Y.Q.[Yun-Qing], Ansari, N., Su, W.[Wei], Sun, Q., Lin, X.,
Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication,
CirSysVideo(18), No. 4, April 2008, pp. 497-509.
IEEE DOI Link 0804
BibRef

Shi, Y.Q.[Yun Q.],
Reversible Data Hiding,
DW04(1-12).
WWW Version. 0505
BibRef

Xuan, G.R.[Guo-Rong], Shi, Y.Q.[Yun Q.], Chai, P.Q.[Pei-Qi], Cui, X.[Xia], Ni, Z.C.[Zhi-Cheng], Tong, X.F.[Xue-Feng],
Optimum Histogram Pair Based Image Lossless Data Embedding,
DW07(264-278).
Springer DOI Link 0712
See also Novel Bayesian Classifier with Smaller Eigenvalues Reset by Threshold Based on Given Database, A. BibRef

Xuan, G.R.[Guo-Rong], Yao, Q.M.[Qiu-Ming], Yang, C.Y.[Cheng-Yun], Gao, J.J.[Jian-Jiong], Chai, P.Q.[Pei-Qi], Shi, Y.Q.[Yun Q.], Ni, Z.C.[Zhi-Cheng],
Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets,
DW06(323-332).
Springer DOI Link 0611
BibRef

Xuan, G.R.[Guo-Rong], Yang, C.Y.[Cheng-Yun], Zhen, Y.Z.[Yi-Zhan], Shi, Y.Q.[Yun Q.], Ni, Z.C.[Zhi-Cheng],
Reversible Data Hiding Using Integer Wavelet Transform and Companding Technique,
DW04(115-124).
WWW Version. 0505
BibRef

Comesana, P.[Pedro], Perez-Gonzalez, F.[Fernando],
The Impact of the Cropping Attack on Scalar STDM Data Hiding,
SPLetters(13), No. 6, June 2006, pp. 353-356.
IEEE DOI Link 0606
BibRef

Meinecke, F.C.[Frank C.], Harmeling, S.[Stefan], Müller, K.R.[Klaus-Robert],
Inlier-based ICA with an application to superimposed images,
IJIST(15), No. 1, 2005, pp. 48-55.
DOI Link 0507
BibRef

Meinecke, F.C.[Frank C.], von Bunau, P.[Paul], Kawanabe, M.[Motoaki], Muller, K.R.[Klaus-R.],
Learning invariances with Stationary Subspace Analysis,
Subspace09(87-92).
IEEE DOI Link 0910
BibRef

Shie, S.C.[Shih-Chieh], Jiang, J.H.[Ji-Han], Chen, L.T.[Long-Tai], Huang, Z.H.[Zeng-Hui],
Secret Image Transmission Scheme Using Secret Codebook,
IEICE(E93-D), No. 2, February 2010, pp. 399-402.
WWW Version. 1002
BibRef

Lin, C.C.[Ching-Chiuan], Hsueh, N.L.[Nien-Lin],
A lossless data hiding scheme based on three-pixel block differences,
PR(41), No. 4, April 2008, pp. 1415-1425.
WWW Version. 0801
Lossless data hiding; Reversible data hiding; Block difference; Steganography BibRef

Lin, C.C.[Ching-Chiuan], Hsueh, N.L.[Nien-Lin],
Hiding Data Reversibly in an Image via Increasing Differences between Two Neighboring Pixels,
IEICE(E90-D), No. 12, December 2007, pp. 2053-2059.
DOI Link 0712
BibRef

Lee, C.C.A.[Chih-Chi-Ang], Wu, H.C.[Hsien-Chu], Tsai, C.S.[Chwei-Shyong], Chu, Y.P.[Yen-Ping],
Adaptive lossless steganographic scheme with centralized difference expansion,
PR(41), No. 6, June 2008, pp. 2097-2106.
WWW Version. 0802
Digital watermarking; Steganography; Lossless data embedding; Difference expansion; Invertible authentication watermark BibRef

Feng, J.B.[Jen-Bang], Wu, H.C.[Hsien-Chu], Tsai, C.S.[Chwei-Shyong], Chang, Y.F.[Ya-Fen], Chu, Y.P.[Yen-Ping],
Visual secret sharing for multiple secrets,
PR(41), No. 12, December 2008, pp. 3572-3581.
WWW Version. 0810
Visual cryptography; Visual secret sharing; Multiple secret sharing; Visual pattern BibRef

Zhang, X.P.[Xiao-Ping], Li, K.[Kan], Wang, X.F.[Xiao-Feng],
A Novel Look-Up Table Design Method for Data Hiding With Reduced Distortion,
CirSysVideo(18), No. 6, June 2008, pp. 769-776.
IEEE DOI Link 0711
BibRef

Li, B., Fang, Y., Huang, J.,
Steganalysis of Multiple-Base Notational System Steganography,
SPLetters(15), No. 1, 2008, pp. 493-496.
IEEE DOI Link 0806
BibRef

Gang, L.T.[Li-Tao], Akansu, A.N.[Ali N.],
Cover Noise Interference Suppression In Multimedia Data Hiding,
IJIG(5), No. 1, January 2005, pp. 191-207. 0501
BibRef

Voloshynovskiy, S.[Sviatoslav], Deguillaume, F.[Frederic], Koval, O.[Oleksiy], Pun, T.[Thierry],
Information-theoretic Data-hiding: Recent Achievements And Open Problems,
IJIG(5), No. 1, January 2005, pp. 5-35. 0501
BibRef

Sallee, P.[Phil],
Model-based Methods For Steganography And Steganalysis,
IJIG(5), No. 1, January 2005, pp. 167-189. 0501
BibRef

Chang, C.C.[Chin-Chen], Hsieh, Y.P.[Yi-Pei], Lin, C.H.[Chia-Hsuan],
Sharing secrets in stego images with authentication,
PR(41), No. 10, October 2008, pp. 3130-3137.
WWW Version. 0808
Steganography; Authentication; Secret image sharing; (k,n) Threshold See also comment on Sharing secrets in stego images with authentication, A. BibRef

Chang, C.C.[Chin-Chen], Hsieh, Y.P.[Yi-Pei],
Authors reply `Sharing secrets in stego images with authentication',
PR(42), No. 7, July 2009, pp. 1620-1621.
Elsevier DOI Link 0903
See also comment on Sharing secrets in stego images with authentication, A. BibRef

Lee, C.F.[Chin-Feng], Chang, C.C.[Chin-Chen], Wang, K.H.[Kuo-Hua],
An improvement of EMD embedding method for large payloads by pixel segmentation strategy,
IVC(26), No. 12, 1 December 2008, pp. 1670-1676.
WWW Version. 0810
Covert communication; Digit steganography; Data hiding; Embedding capacity EMD: Empirical mode decomposition BibRef

Lee, C.F.[Chin-Feng], Chen, H.L.[Hsing-Ling], Lai, S.H.[Shu-Hua],
An adaptive data hiding scheme with high embedding capacity and visual image quality based on SMVQ prediction through classification codebooks,
IVC(28), No. 8, August 2010, pp. 1293-1302.
Elsevier DOI Link 1006
Data hiding; Image quality of stego-image; Embedding capacity; Side-match vector quantization; SMVQ prediction BibRef

Yang, C.N.[Ching-Nung], Ciou, C.B.[Chuei-Bang],
A comment on 'Sharing secrets in stego images with authentication',
PR(42), No. 7, July 2009, pp. 1615-1619.
Elsevier DOI Link 0903
Secret sharing; Image secret sharing; Steganography; Authentication See also Sharing secrets in stego images with authentication. BibRef

Yang, C.N.[Ching-Nung], Ciou, C.B.[Chuei-Bang],
Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability,
IVC(28), No. 12, December 2010, pp. 1600-1610.
Elsevier DOI Link 1003
Image secret sharing; Visual cryptography; Polynomial-based secret sharing; Lagrange interpolation BibRef

Li, P.[Peng], Ma, P.J.[Pei-Jun], Su, X.H.[Xiao-Hong], Yang, C.N.[Ching-Nung],
Improvements of a two-in-one image secret sharing scheme based on gray mixing model,
JVCIR(23), No. 3, April 2012, pp. 441-453.
Elsevier DOI Link 1203
Image secret sharing; Visual cryptography; Polynomial-based secret sharing; Gray mixing model; Information hiding; Lagrange interpolation; (k,n)-threshold scheme; Image processing BibRef

Chang, C.C.[Chin-Chen], Kieu, T.D.[The Duc], Wu, W.C.[Wen-Chuan],
A lossless data embedding technique by joint neighboring coding,
PR(42), No. 7, July 2009, pp. 1597-1603.
Elsevier DOI Link 0903
BibRef
Earlier: A1, A3, Only:
Reversible Quantization-Index Modulation Using Neighboring Correlation,
DW07(222-232).
Springer DOI Link 0712
Information hiding; Reversible data embedding; Vector quantization BibRef

Liu, N., Amin, P., Subbalakshmi, K.P.,
Security and Robustness Enhancement for Image Data Hiding,
MultMed(9), No. 3, April 2007, pp. 466-474.
IEEE DOI Link 0905
BibRef

Amin, P.[Palak], Subbalakshmi, K.P.,
Detecting Hidden Messages Using Image Power Spectrum,
ICIP07(I: 421-424).
IEEE DOI Link 0709
BibRef

Kim, K.S.[Kyung-Su], Lee, M.J.[Min-Jeong], Lee, H.Y.[Hae-Yeoun], Lee, H.K.[Heung-Kyu],
Reversible data hiding exploiting spatial correlation between sub-sampled images,
PR(42), No. 11, November 2009, pp. 3083-3096.
Elsevier DOI Link 0907
Content authentication; Data hiding; Histogram modification; Reversible data hiding; Sub-sampling; Watermarking BibRef

Eslami, Z., Razzaghi, S.H., Ahmadabadi, J.Z.[J. Zarepour],
Secret image sharing based on cellular automata and steganography,
PR(43), No. 1, January 2010, pp. 397-404.
Elsevier DOI Link 0909
Secret sharing scheme; Linear memory cellular automata; Digital signature; Authentication; Verifiability BibRef

Sabeti, V.[Vajiheh], Samavi, S.[Shadrokh], Mahdavi, M.[Mojtaba], Shirani, S.[Shahram],
Steganalysis and payload estimation of embedding in pixel differences using neural networks,
PR(43), No. 1, January 2010, pp. 405-415.
Elsevier DOI Link 0909
Steganography; Steganalysis; Pixel-value differencing; Artificial neural network (ANN); Perceptrons BibRef

Cheng, Y.M.[Yu-Ming], Wang, C.M.[Chung-Ming],
A Novel Approach to Steganography in High- Dynamic-Range Images,
MultMedMag(16), No. 3, July-September 2009, pp. 70-80.
IEEE DOI Link 0909
BibRef

Zeng, X.T.[Xian-Ting], Ping, L.D.[Ling-Di], Pan, X.Z.[Xue-Zeng],
A lossless robust data hiding scheme,
PR(43), No. 4, April 2010, pp. 1656-1667.
Elsevier DOI Link 1002
Lossless data hiding; Watermarking; Steganography; Image processing; Robust lossless data hiding; Semi-fragile authentication BibRef

Rocha, A.[Anderson], Goldenstein, S.K.[Siome K.],
Progressive randomization: Seeing the unseen,
CVIU(114), No. 3, March 2010, pp. 349-362.
Elsevier DOI Link 1003
BibRef
Earlier:
PR: More than Meets the Eye,
ICCV07(1-8).
IEEE DOI Link 0710
Progressive Randomization. Image descriptor for broad categorization. Image inference; Progressive randomization; Image categorization; Image forensics; Steganalysis BibRef

Kalantari, N.K., Ahadi, S.M.,
A Logarithmic Quantization Index Modulation for Perceptually Better Data Hiding,
IP(19), No. 6, June 2010, pp. 1504-1517.
IEEE DOI Link 1006
BibRef

Zhang, X.P.[Xin-Peng],
Efficient Data Hiding With Plus-Minus One or Two,
SPLetters(17), No. 7, July 2010, pp. 635-638.
IEEE DOI Link 1006
BibRef

Zhang, X.P.[Xin-Peng],
Reversible Data Hiding With Optimal Value Transfer,
MultMed(15), No. 2, 2013, pp. 316-325.
IEEE DOI Link 1302
BibRef

Zhang, X.P.[Xin-Peng],
Reversible Data Hiding in Encrypted Image,
SPLetters(18), No. 4, April 2011, pp. 255-258.
IEEE DOI Link 1103
BibRef

Lin, G.S.[Guo-Shiang], Chang, Y.T., Lie, W.N.[Won-Nuiig],
A Framework of Enhancing Image Steganography With Picture Quality Optimization and Anti-Steganalysis Based on Simulated Annealing Algorithm,
MultMed(12), No. 5, 2010, pp. 345-357.
IEEE DOI Link 1008
BibRef

Chuang, C.H.[Cheng-Hung], Lin, G.S.[Guo-Shiang],
An Optical Video Cryptosystem with Adaptive Steganography,
MVA09(439-).
PDF Version. 0905
BibRef

Lin, P.Y.[Pei-Yu], Chan, C.S.[Chi-Shiang],
Invertible secret image sharing with steganography,
PRL(31), No. 13, 1 October 2010, pp. 1887-1893.
Elsevier DOI Link 1003
Secret sharing; Steganography; Reversible; Distortion-free; Modulo operator BibRef

Lin, S.J.[Sian-Jheng], Chen, S.K.[Shang-Kuan], Lin, J.C.[Ja-Chen],
Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion,
JVCIR(21), No. 8, November 2010, pp. 900-916.
Elsevier DOI Link 1011
Visual cryptography; Flipping; Conditionally optimal contrast; Secret image sharing; Visual secret sharing; Non-expansible; Perfect security; Random grids Encode 2 into 2 transparent layers, superimpose and get one image, flip one and get second image. BibRef

Chen, S.K.[Shang-Kuan], Lin, S.J.[Sian-Jheng],
Optimal (2,n) and (2,infinity) visual secret sharing by generalized random grids,
JVCIR(23), No. 4, May 2012, pp. 677-684.
Elsevier DOI Link 1205
Contrast; Random grids; Visual cryptography; Visual secret sharing; Generalized random grids; Image sharing; Secret image sharing; Optimal contrast BibRef

Jajal, B.[Brijesh], Desai, V.[Vipul],
Identification of copy-paste regions in digital image,
IJIST(20), No. 4, December 2010, pp. 367-369.
DOI Link 1011
Image forensics. BibRef

Jung, S.W., Ha, L.T., Ko, S.J.,
A New Histogram Modification Based Reversible Data Hiding Algorithm Considering the Human Visual System,
SPLetters(18), No. 2, February 2011, pp. 95-98.
IEEE DOI Link 1101
BibRef

Hsiao, J.Y.[Ju-Yuan], Chang, C.T.[Chieh-Tse],
An adaptive steganographic method based on the measurement of just noticeable distortion profile,
IVC(29), No. 2-3, February 2011, pp. 155-166.
Elsevier DOI Link 1101
Data hiding; Just noticeable distortion; Steganography; Information hiding BibRef

Hong, W.[Wien], Chen, T.S.[Tung-Shou],
Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism,
JVCIR(22), No. 2, February 2011, pp. 131-140.
Elsevier DOI Link 1102
Reversible data hiding; Histogram-shifting; Image interpolation; Reference pixel; Steganography; Interpolation error; Expansion embedding; Embedding capacity BibRef

Hong, W.[Wien],
Human visual system based data embedding method using quadtree partitioning,
SP:IC(27), No. 10, November 2012, pp. 1123-1133.
Elsevier DOI Link 1211
Data hiding; Pixel value differencing; LSB replacement; Diamond encoding BibRef

Hong, W.[Wien], Chen, T.S.[Tung-Shou], Wu, H.Y.[Han-Yan],
An Improved Reversible Data Hiding in Encrypted Images Using Side Match,
SPLetters(19), No. 4, April 2012, pp. 199-202.
IEEE DOI Link 1203
BibRef

Hou, C.L., Lu, C., Tsai, S.C., Tzeng, W.G.,
An Optimal Data Hiding Scheme With Tree-Based Parity Check,
IP(20), No. 3, March 2011, pp. 880-886.
IEEE DOI Link 1103
BibRef

Fallahpour, M., Megias, D., Ghanbari, M.,
Reversible and high-capacity data hiding in medical images,
IET-IPR(5), No. 2, April 2011, pp. 190-197.
DOI Link 1103
BibRef
Earlier:
High capacity, reversible data hiding in medical images,
ICIP09(4241-4244).
IEEE DOI Link 0911
BibRef

Gao, X., An, L., Yuan, Y., Tao, D., Li, X.,
Lossless Data Embedding Using Generalized Statistical Quantity Histogram,
CirSysVideo(21), No. 8, August 2011, pp. 1061-1070.
IEEE DOI Link 1108
BibRef

Guo, C.[Cheng], Chang, C.C.[Chin-Chen], Qin, C.[Chuan],
A hierarchical threshold secret image sharing,
PRL(33), No. 1, 1 January 2012, pp. 83-91.
Elsevier DOI Link 1112
Hierarchical threshold; Distortion-free; Secret image sharing; Access structure BibRef

Guo, C.[Cheng], Chang, C.C.[Chin-Chen], Qin, C.[Chuan],
A multi-threshold secret image sharing scheme based on MSP,
PRL(33), No. 12, 1 September 2012, pp. 1594-1600.
Elsevier DOI Link 1208
Multi-threshold secret sharing; Access structure; Secret image sharing; Monotone span programs BibRef

Lee, C.W., Tsai, W.H.[Wen-Hsiang],
A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability,
IP(21), No. 1, January 2012, pp. 207-218.
IEEE DOI Link 1112
BibRef

Zhang, W., Chen, B., Yu, N.,
Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers,
IP(21), No. 6, June 2012, pp. 2991-3003.
IEEE DOI Link 1202
BibRef

Wang, C.T.[Cheng-Tzu], Yu, H.F.[Hsiang-Fu],
A Markov-based reversible data hiding method based on histogram shifting,
JVCIR(23), No. 5, July 2012, pp. 798-811.
Elsevier DOI Link 1205
Reversible data hiding; Information theory; Markov; Watermarking; Histogram shifting; Lossless; Embedding data; Man-made picture BibRef

Yang, C.N.[Ching-Nung], Wu, C.C.[Chih-Cheng], Lin, Y.C.[Yi-Chin], Kim, C.[Cheonshik],
Enhanced Matrix-Based Secret Image Sharing Scheme,
SPLetters(19), No. 12, December 2012, pp. 789-792.
IEEE DOI Link 1212
BibRef

Varsaki, E.E.[Eleni E.], Fotopoulos, V.[Vassilis], Skodras, A.N.[Athanassios N.],
Data hiding based on image texture classification,
SIViP(7), No. 2, March 2013, pp. 247-253.
WWW Version. 1303
BibRef

Lou, D.C.[Der-Chyuan], Chou, C.L.[Chao-Lung], Wei, H.Y.[Hung-Yuan], Huang, H.F.[Hui-Feng],
Active steganalysis for interpolation-error based reversible data hiding,
PRL(34), No. 9, July 2013, pp. 1032-1036.
Elsevier DOI Link 1305
Reversible data hiding; Active steganalysis; General Gaussian distribution; Support vector machine BibRef

Elshoura, S.M., Megherbi, D.B.,
A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments,
SP:IC(28), No. 5, May 2013, pp. 531-552.
Elsevier DOI Link 1305
Information hiding; Image processing; Steganography; Multi-media computing; Secret communication; Image watermarking; Secret information content verification and authentication; Tchebichef moments BibRef

Elshoura, S.M., Megherbi, D.B.,
Analysis of noise sensitivity of Tchebichef and Zernike moments with application to image watermarking,
JVCIR(24), No. 5, July 2013, pp. 567-578.
Elsevier DOI Link 1306
Sensitivity; Noise sensitivity; Tchebichef moments; Zernike moments; Image watermarking; Tampering detection; Image reconstruction; Error measurement BibRef

Li, X.L.[Xiao-Long], Li, B.[Bin], Yang, B.[Bin], Zeng, T.Y.[Tie-Yong],
General Framework to Histogram-Shifting-Based Reversible Data Hiding,
IP(22), No. 6, 2013, pp. 2181-2191.
IEEE DOI Link 1307
histogram-shifting-based reversible data hiding BibRef

Zhang, W.M.[Wei-Ming], Hu, X.[Xiaocheng], Li, X.[Xiaolong], Yu, N.H.[Neng-Hai],
Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression,
IP(22), No. 7, 2013, pp. 2775-2785.
IEEE DOI Link entropy coder; ;histogram shift; lossless data compression; 1307
BibRef

Lee, K.H., Chiu, P.L.,
Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints,
IP(22), No. 10, 2013, pp. 3830-3841.
IEEE DOI Link 1309
Visual secret sharing scheme BibRef

Li, P.[Peng], Yang, C.N.[Ching-Nung], Wu, C.C.[Chih-Cheng], Kong, Q.[Qian], Ma, Y.[Yanpeng],
Essential secret image sharing scheme with different importance of shadows,
JVCIR(24), No. 7, 2013, pp. 1106-1114.
Elsevier DOI Link 1309
Secret sharing BibRef

Mohd, B.J.[Bassam Jamil], Abed, S.[Sa'ed], Na'ami, B.[Bassam], Hayajneh, T.[Thaier],
Hierarchical steganography using novel optimum quantization technique,
SIViP(7), No. 6, November 2013, pp. 1029-1040.
Springer DOI Link 1310
BibRef

Wang, L.F.[Ling-Fei], Pan, Z.B.[Zhi-Bin], Ma, X.X.[Xiao-Xiao], Hu, S.[Sen],
A novel high-performance reversible data hiding scheme using SMVQ and improved locally adaptive coding method,
JVCIR(25), No. 2, 2014, pp. 454-465.
Elsevier DOI Link 1402
Data hiding BibRef

Ong, S.Y.[Sim-Ying], Wong, K.S.[Kok-Sheik], Tanaka, K.[Kiyoshi],
A Scalable Reversible Data Embedding Method with progressive quality degradation functionality,
SP:IC(29), No. 1, 2014, pp. 135-149.
Elsevier DOI Link 1402
Scalable carrier capacity. novel reversible information hiding method. BibRef

Ong, S.Y.[Sim-Ying], Wong, K.S.[Kok-Sheik],
Rotational based rewritable data hiding in JPEG,
VCIP13(1-6)
IEEE DOI Link 1402
Q-factor BibRef

Ong, S.Y.[Sim Ying], Minemura, K.[Kazuki], Wong, K.S.[Kok Sheik],
Progressive quality degradation in JPEG compressed image using DC block orientation with rewritable data embedding functionality,
ICIP13(4574-4578)
IEEE DOI Link 1402
Block orientation BibRef

Liu, L.[Li], Wang, A.[Anhong], Chang, C.C.[Chin-Chen], Li, Z.H.[Zhi-Hong],
A novel real-time and progressive secret image sharing with flexible shadows based on compressive sensing,
SP:IC(29), No. 1, 2014, pp. 128-134.
Elsevier DOI Link 1402
Compressed sensing BibRef

Zielinska, E.[Elzbieta], Mazurczyk, W.[Wojciech], Szczypiorski, K.[Krzysztof],
Trends in Steganography,
CACM(56), No. 3, March 2014, pp. 86-95.
DOI Link 1403
Survey, Steganography. Methods for embedding secret data are more sophisticated than their ancient predecessors, but the basic principles remain unchanged. BibRef

Hou, X.D.[Xiao-Dan], Zhang, T.[Tao], Xiong, G.[Gang], Lu, Z.B.[Zhi-Bo], Xie, K.[Kai],
A novel steganalysis framework of heterogeneous images based on GMM clustering,
SP:IC(29), No. 3, 2014, pp. 385-399.
Elsevier DOI Link 1403
Steganalysis BibRef

Chen, J.[Jeanne],
A PVD-based data hiding method with histogram preserving using pixel pair matching,
SP:IC(29), No. 3, 2014, pp. 375-384.
Elsevier DOI Link 1403
Pixel value difference BibRef


Singh, R.K., Lall, B.,
Saliency map based image steganography,
IVCNZ13(430-435)
IEEE DOI Link 1402
image watermarking BibRef

Zeng, Y.C.[Yi-Chong], Tsai, C.H.[Chi-Hung],
High capacity multi-scale image sharing scheme by combining visual cryptography with data hiding,
ICIP13(4536-4539)
IEEE DOI Link 1402
Visual cryptography; capacity; data hiding; downscaling; secret sharing BibRef

Wilkowski, A.[Artur], Kasprzak, W.[Wlodzimierz],
Steganographic Authentication Method for Electronic IDs,
ICIAR13(726-733).
Springer DOI Link 1307
BibRef

Najeena, K.S., Imran, B.M.,
An efficient steganographic technique based on chaotic maps and adpative PPM embedding,
ICSIPR13(293-297).
IEEE DOI Link 1304
BibRef

Nadiya, P.V., Imran, B.M.[B. Mohammed],
Image steganography in DWT domain using double-stegging with RSA encryption,
ICSIPR13(283-287).
IEEE DOI Link 1304
BibRef

Lee, Y.W.[Young-Woon], Heo, J.P.[Jae-Pil], Yoon, S.E.[Sung-Eui],
Quadra-Embedding: Binary Code Embedding with Low Quantization Error,
ACCV12(II:214-227).
Springer DOI Link 1304
BibRef

Chaumont, M.[Marc], Kouider, S.[Sarra],
Steganalysis by ensemble classifiers with boosting by regression, and post-selection of features,
ICIP12(1133-1136).
IEEE DOI Link 1302
BibRef

Tan, S.Q.[Shun-Quan], Li, B.[Bin],
Targeted steganalysis of adaptive pixel-value differencing steganography,
ICIP12(1129-1132).
IEEE DOI Link 1302
BibRef

Mainberger, M.[Markus], Schmaltz, C.[Christian], Berg, M.[Matthias], Weickert, J.[Joachim], Backes, M.[Michael],
Diffusion-based Image Compression in Steganography,
ISVC12(II: 219-228).
Springer DOI Link 1209
BibRef

Wang, X.F.[Xiao-Feng], Li, Z.[Zhen], Zhang, X.[Xiaoni], Wang, S.P.[Shang-Ping], Chen, J.[Jing],
(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images,
IWDW11(425-438).
Springer DOI Link 1208
BibRef

Wang, H.T.[Hong-Tao], Liu, M.[Meng], Li, Q.[Qian], Yang, H.T.[Hai-Tao], Li, H.Q.A.[Hou-Qi-Ang],
Region based motion vector prediction using data hiding and decoder side reasoning,
VCIP11(1-4).
IEEE DOI Link 1201
BibRef

Niimi, M.[Michiharu], Noda, H.[Hideki],
An application of Sparse Code Shrinkage to image steganalysis based on supervised learning,
ICIP11(1941-1944).
IEEE DOI Link 1201
BibRef

Guan, Q.X.[Qing-Xiao], Dong, J.[Jing], Tan, T.N.[Tie-Niu],
An effective image steganalysis method based on neighborhood information of pixels,
ICIP11(2721-2724).
IEEE DOI Link 1201
BibRef

Suresh, N.[Nakum], Karthik, K.[Kannan],
Secure fingerprint embedding based on modified GDFT based parametric transform,
ICIIP11(1-6).
IEEE DOI Link 1112
BibRef

Sharma, M.[Manoj], Shukla, M.[Manoj], Kaul, A.[Amit],
Image hiding using unitary similarity transformation,
ICIIP11(1-4).
IEEE DOI Link 1112
BibRef

Basu, A.[Abhishek], Das, T.S.[Tirtha Sankar], Sarkar, S.K.[Subir Kumar], Majumder, S.[Swanirbhar],
On the implementation of a information hiding design based on saliency map,
ICIIP11(1-6).
IEEE DOI Link 1112
BibRef

Arya, M.S.[Meenakshi S], Jain, N.[Nikita], Sisodia, J.[Jai], Sehgal, N.[Nukul],
DNA encoding based feature extraction for biometric watermarking,
ICIIP11(1-6).
IEEE DOI Link 1112
BibRef

Kavehvash, Z.[Zahra], Ghaemmaghami, S.[Shahrokh],
On Limits of Embedding in 3D Images Based on 2D Watson's Model,
DW10(293-304).
Springer DOI Link 1010
BibRef

Liwicki, M.[Marcus], Uchida, S.[Seiichi], Iwamura, M.[Masakazu], Omachi, S.[Shinichiro], Kise, K.[Koichi],
Embedding Meta-Information in Handwriting: Reed-Solomon for Reliable Error Correction,
FHR10(51-56).
IEEE DOI Link 1011
BibRef

Wang, J.X.[Jun-Xiang], Ni, J.Q.[Jiang-Qun],
A fast performance estimation scheme for histogram shifting based multi-layer embedding,
ICIP10(3701-3704).
IEEE DOI Link 1009
a lossless data hiding scheme. Limited capacity. BibRef

Guo, M.[Meng], Zhang, H.B.[Hong-Bin],
High Capacity Data Hiding for Binary Image Authentication,
ICPR10(1441-1444).
IEEE DOI Link 1008
BibRef

Lin, Y.C.[Yih-Chuan], Li, T.S.[Tzung-Shian], Chang, Y.T.[Yao-Tang], Wang, C.C.[Chuen-Ching], Chen, W.T.[Wen-Tzu],
A Subsampling and Interpolation Technique for Reversible Histogram Shift Data Hiding,
ICISP10(384-393).
Springer DOI Link 1006
BibRef

Huang, C.P.[Chin-Pan],
A new scheme of sharing secrets in stego images with authentication,
ICIP09(1269-1272).
IEEE DOI Link 0911
BibRef

Gao, Y.K.[Yun-Kai], Li, X.L.[Xiao-Long], Zeng, T.Y.[Tie-Yong], Yang, B.[Bin],
Improving embedding efficiency via matrix embedding: A case study,
ICIP09(109-112).
IEEE DOI Link 0911
BibRef

Gul, G.[Gokhan], Kurugollu, F.[Fatih],
A novel universal steganalyser design: 'LogSv',
ICIP09(4249-4252).
IEEE DOI Link 0911
BibRef

Yu, X.Y.[Xiao Yi], Wang, A.[Aiming],
An improved lossless data hiding based on space filling curves,
ICIP09(4221-4224).
IEEE DOI Link 0911
BibRef

Mayer, J.[Joceli], Bermudez, J.C.M., Legg, A.P., Uchoa-Filho, B.F., Mukherjee, D., Said, A., Samadani, R., Simske, S.,
Design of high capacity 3D print codes aiming for robustness to the PS channel and external distortions,
ICIP09(105-108).
IEEE DOI Link 0911
Adding high-density information to printed document. BibRef

Nabaee, H., Faez, K.,
An efficient steganography method based on reducing changes,
IVCNZ10(1-7).
IEEE DOI Link 1203
BibRef

Famili, Z.[Zainab], Faez, K.[Karim], Fadavi, A.[Abbas],
A New Steganography Based on L2 Technic,
CIARP09(1062-1069).
Springer DOI Link 0911
BibRef

Deng, Q.L.[Qian-Lan], Lin, J.J.[Jia-Jun],
A Universal Steganalysis Using Features Derived from the Differential Image Histogram in Frequency Domain,
CISP09(1-4).
IEEE DOI Link 0910
BibRef

Zhang, L.[Liang],
Wavelet Domain Steganalysis Based on Predictability Analysis and Magnitude Prediction,
CISP09(1-4).
IEEE DOI Link 0910
BibRef

Yu, X.Y.[Xiao Yi], Wang, A.[Aiming],
Steganography with Hash,
CISP09(1-4).
IEEE DOI Link 0910
BibRef
And:
Steganalysis Based on Bayesion Network and Genetic Algorithm,
CISP09(1-4).
IEEE DOI Link 0910
BibRef

Sohn, H.[Hosik], Ro, Y.M.[Yong Man], Plataniotis, K.N.[Kostantinos N.],
Content Sharing Based on Personal Information in Virtually Secured Space,
DW08(388-400).
Springer DOI Link 0811
BibRef

Huang, H.J.[Hua-Jun], Tan, J.S.[Jun-Shan], Sun, X.M.[Xing-Ming], Liu, L.X.[Ling-Xi],
Detection of Hidden Information in Webpage Based on Higher-Order Statistics,
DW08(293-302).
Springer DOI Link 0811
BibRef

Wahab, A.W.A.[Ainuddin Wahid Abdul], Briffa, J.A.[Johann A.], Schaathun, H.G.[Hans Georg],
On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography,
DW08(342-349).
Springer DOI Link 0811
BibRef

Sachnev, V.[Vasily], Kim, H.J.[Hyoung Joong],
An Improved Matrix Encoding Scheme for JPEG Steganography,
IWDW11(3-15).
Springer DOI Link 1208
BibRef
Earlier:
Ternary Data Hiding Technique for JPEG Steganography,
DW10(202-210).
Springer DOI Link 1010
BibRef

Sachnev, V.[Vasiliy], Kim, H.J.[Hyoung Joong], Zhang, R.Y.[Rong-Yue], Choi, Y.S.[Yong Soo],
A Novel Approach for JPEG Steganography,
DW08(209-217).
Springer DOI Link 0811
BibRef

Sun, Y.F.[Yi-Feng], Liu, F.L.[Fen-Lin], Liu, B.[Bin], Wang, P.[Ping],
Steganalysis Based on Difference Image,
DW08(184-198).
Springer DOI Link 0811
BibRef

Li, T.[Ting], Zhao, Y.[Yao], Ni, R.R.[Rong-Rong], Yu, L.F.[Li-Fang],
A High Capacity Steganographic Algorithm in Color Images,
DW08(218-228).
Springer DOI Link 0811
BibRef

Islam, N.[Naveed], Puech, W.[William], Brouzet, R.[Robert],
A Homomorphic Method for Sharing Secret Images,
DW09(121-135).
Springer DOI Link 0908
BibRef

Puhan, N.B., Ho, A.T.S., Sattar, F.,
High Capacity Data Hiding in Binary Document Images,
DW09(149-161).
Springer DOI Link 0908
BibRef

Zheng, X.L.[Xue-Ling], Huang, L.S.[Liu-Sheng], Chen, Z.[Zhili], Yu, Z.S.[Zhen-Shan], Yang, W.[Wei],
Hiding Information by Context-Based Synonym Substitution,
DW09(162-169).
Springer DOI Link 0908
BibRef

Kim, S.[Semin], de Neve, W.[Wesley], Ro, Y.M.[Yong Man],
A Statistical and Iterative Method for Data Hiding in Palette-Based Images,
DW09(170-183).
Springer DOI Link 0908
BibRef

Agrawal, N.[Neha], Savvides, M.[Marios],
Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching,
Biometrics09(85-92).
IEEE DOI Link 0906
BibRef

Xuan, G.R.[Guo-Rong], Shi, Y.Q.[Yun Q.], Chai, P.Q.[Pei-Qi], Tong, X.F.[Xue-Feng], Teng, J.Z.[Jian-Zhong], Li, J.[Jue],
Reversible binary image data hiding by run-length histogram modification,
ICPR08(1-4).
IEEE DOI Link 0812
BibRef

Shyu, S.J.[Shyong Jian], Chuang, C.C.[Chun-Chieh], Chen, Y.R.[Ying-Ru], Lai, A.F.[Ah-Fur],
Weighted Threshold Secret Image Sharing,
PSIVT09(988-998).
Springer DOI Link 0901
BibRef

Sur, A.[Arijit], Goel, P.[Piyush], Mukhopadhyay, J.[Jayanta],
A New Approach for Reducing Embedding Noise in Multiple Bit Plane Steganography,
ICISP08(580-587).
Springer DOI Link 0807
BibRef

Sarkar, A., Nataraj, L., Manjunath, B.S., Madhow, U.,
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS: A randomized block based hiding scheme,
ICIP08(1292-1295).
IEEE DOI Link 0810
BibRef

Kang, X.G.[Xian-Gui], Zhong, X.[Xiong], Huang, J.W.[Ji-Wu], Zeng, W.J.[Wen-Jun],
An efficient print-scanning resilient data hiding scheme based on a novel LPM,
ICIP08(2080-2083).
IEEE DOI Link 0810
BibRef

Cheddad, A.[Abbas], Condell, J.[Joan], Curran, K.[Kevin], McKevitt, P.[Paul],
Enhancing Steganography in Digital Images,
CRV08(326-332).
IEEE DOI Link 0805
BibRef

Navas, K.A., Aravind, M.L., Sasi Kumar, M.,
A novel quality measure for information hiding in images,
Tensor08(1-5).
IEEE DOI Link 0806
BibRef

Perez-Gonzalez, F.[Fernando], Heileman, G.L.[Greg L.], Abdallah, C.T.[Chaouki T.],
Benford's Law in Image Processing,
ICIP07(I: 405-408).
IEEE DOI Link 0709
Apply to steganalysis. (Detection) (Benford: Lists of numbers by digit, the low digits dominate -- leading digit is most often 1) BibRef

Gou, H.M.[Hong-Mei], Wu, M.[Min],
Improving Embedding Payload in Binary Imageswith 'Super-Pixels',
ICIP07(III: 277-280).
IEEE DOI Link 0709
BibRef

Chen, C.H.[Chun-Hua], Shi, Y.Q.[Yun Q.], Xuan, G.R.[Guo-Rong],
Steganalyzing Texture Images,
ICIP07(II: 153-156).
IEEE DOI Link 0709
BibRef

Yu, X.Y.[Xiao-Yi], Zhu, X.S.[Xin-Shan], Babaguchi, N.[Noboru],
Steganography using Sensor Noise and Linear Prediction Synthesis Filter,
ICIP07(II: 157-160).
IEEE DOI Link 0709
BibRef

Sarkar, A., Manjunath, B.S.,
Estimating Steganographic Capacity for Odd-Even Based Embedding and its Use in Individual Compensation,
ICIP07(I: 409-412).
IEEE DOI Link 0709
BibRef

Smith, C.B.[Christopher B.],
Steganalysis using Noise Variance Estimation,
ICIP07(I: 417-420).
IEEE DOI Link 0709
BibRef

Xuan, G.R.[Guo-Rong], Shi, Y.Q.[Yun Q.], Ni, Z.C.[Zhi-Cheng], Chai, P.Q.[Pei-Qi], Cui, X.[Xia], Tong, X.F.[Xue-Feng],
Reversible Data Hiding for JPEG Images Based on Histogram Pairs,
ICIAR07(715-727).
Springer DOI Link 0708
BibRef

Zou, D.K.[De-Kun], Tian, J.[Jun], Bloom, J.A.[Jeffrey A.], Zhai, J.F.[Jie-Fu],
Data Hiding in Film Grain,
DW06(197-211).
Springer DOI Link 0611
BibRef

Kim, Y.H.[Youn-Hee], Duric, Z.[Zoran], Richards, D.[Dana],
Towards Lower Bounds on Embedding Distortion in Information Hiding,
DW06(362-376).
Springer DOI Link 0611
BibRef

Marçal, A.R.S.[André R.S.], Pereira, P.R.[Patricia R.],
A Steganographic Method for Digital Images Robust to RS Steganalysis,
ICIAR05(1192-1199).
Springer DOI Link 0509
BibRef

Lai, B.L.[Bo-Luen], Chang, L.W.[Long-Wen],
Adaptive Data Hiding for Images Based on Harr Discrete Wavelet Transform,
PSIVT06(1085-1093).
Springer DOI Link 0612
BibRef

Xuan, G.R.[Guo-Rong], Shi, Y.Q.[Yun Q.], Huang, C.[Cong], Fu, D.D.[Dong-Dong], Zhu, X.M.[Xiu-Ming], Chai, P.Q.[Pei-Qi], Gao, J.J.[Jian-Jiong],
Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA),
DW06(49-60).
Springer DOI Link 0611
BibRef

Nguyen, B.C.[Bui Cong], Yoon, S.M.[Sang Moon], Lee, H.K.[Heung-Kyu],
Multi Bit Plane Image Steganography,
DW06(61-70).
Springer DOI Link 0611
BibRef

Guan, Q.X.[Qing-Xiao], Dong, J.[Jing], Tan, T.N.[Tie-Niu],
Blind Quantitative Steganalysis Based on Feature Fusion and Gradient Boosting,
DW10(266-279).
Springer DOI Link 1010
BibRef

Dong, J.[Jing], Chen, X.C.[Xiao-Chuan], Guo, L.[Lei], Tan, T.N.[Tie-Niu],
Fusion Based Blind Image Steganalysis by Boosting Feature Selection,
DW07(87-98).
Springer DOI Link 0712
BibRef

Chen, X.C.[Xiao-Chuan], Wang, Y.H.[Yun-Hong], Tan, T.N.[Tie-Niu], Guo, L.[Lei],
Blind Image Steganalysis Based on Statistical Analysis of Empirical Matrix,
ICPR06(III: 1107-1110).
IEEE DOI Link 0609
BibRef

Candan, C.,
A Transcoding Robust Data Hiding Method for Image Communication Applications,
ICIP05(III: 660-663).
IEEE DOI Link 0512
BibRef

Cheng, J., Kot, A.C., Liu, J., Cao, H.,
Detection of Data Hiding in Binary Text Images,
ICIP05(III: 73-76).
IEEE DOI Link 0512
BibRef

Whelan, K.M., Silvestre, G.C.M., Hurley, N.J.,
Iterative Decoding of Scale Invariant Image Data-Hiding,
ICIP05(I: 989-992).
IEEE DOI Link 0512
BibRef

Kimoto, T.,
Designing Template Cells Suitable for Secret-Sharing Halftone Images by Quantitative Analysis,
ICIP06(2593-2596).
IEEE DOI Link 0610
BibRef
Earlier:
Implementation of Level Transformations for Hiding Watermarks in Image Bit-Planes under Limited Level Changes,
ICIP05(I: 253-256).
IEEE DOI Link 0512
BibRef

Yu, X.Y.[Xiao-Yi], Wang, Y.H.[Yun-Hong], Tan, T.N.[Tie-Niu],
Model based steganalysis,
ICIP04(IV: 2625-2628).
IEEE DOI Link 0505
BibRef

Solanki, K., Sullivan, K., Madhow, U., Manjunath, B.S., Chandrasekaran, S.,
Statistical Restoration for Robust and Secure Steganography,
ICIP05(II: 1118-1121).
IEEE DOI Link 0512
BibRef

Wang, X.F.[Xue-Feng], Yao, Z.[Zhen], Li, C.T.[Chang-Tsun],
A Palette-Based Image Steganographic Method Using Colour Quantisation,
ICIP05(II: 1090-1093).
IEEE DOI Link 0512
BibRef

del Rey, A.M.[A. Martín], Sánchez, G.R.[G. Rodríguez], de la Villa-Cuenca, A.,
A Protocol to Cipher Digital Images Based on Cat Maps and Cellular Automata,
IbPRIA07(I: 571-578).
Springer DOI Link 0706
BibRef

del Rey, A.M.[Angel Martín],
A Matrix-Based Secret Sharing Scheme for Images,
CIARP08(635-642).
Springer DOI Link 0809
BibRef
And:
A Secret Sharing Scheme for Digital Images Based on Two-Dimensional Linear Cellular Automata,
IWCIA08(xx-yy).
Springer DOI Link 0804
BibRef

Marańón, G.Á.[Gonzalo Álvarez], Encinas, L.H.[Luis Hernández], del Rey, Á.M.[Ángel Martín],
A New Secret Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata,
IbPRIA05(I:411).
Springer DOI Link 0509
BibRef

Jiang, M.[Ming], Wong, E., Memon, N., Wu, X.L.[Xiao-Lin],
A simple technique for estimating message lengths for additive noise steganography,
ICARCV04(II: 983-986).
IEEE DOI Link 0412
BibRef

Tian, J.[Jun], Wells, R.O.,
Reversible data-embedding with a hierarchical structure,
ICIP04(V: 3419-3422).
IEEE DOI Link 0505
BibRef

Sattar, F., Yu, D.[Dan], Razul, S.G., Krishnan, S.M.,
Transparent information hiding with automatic embedding range selection for ownership verification,
ICIP04(IV: 2657-2660).
IEEE DOI Link 0505
BibRef

Amin, P., Subbalakshuni, K.P.,
Rotation and cropping resilient data hiding with zernike moments,
ICIP04(IV: 2175-2178).
IEEE DOI Link 0505
BibRef

Liu, N.[Ning], Subbalakshun, K.P.,
Non-uniform quantizer design for image data hiding,
ICIP04(IV: 2179-2182).
IEEE DOI Link 0505
BibRef

Xue, G.[Gang], Lu, P.[Peizhong], Wang, J.L.[Jin-Lian],
A Counter-Geometric Distortions Data Hiding Scheme Using Double Channels in Color Images,
DW04(42-54).
WWW Version. 0505
BibRef

Yu, J.J.[Jeong Jae], Jung, C.H.[Chang-Ho], Yoon, S.K.[Seok-Koo], Lee, S.J.[Sang-Jin],
Steganographic Scheme Using a Block Cipher,
DW04(163-170).
WWW Version. 0505
BibRef

Chandramouli, R.,
On information hiding with incomplete information about steganalysis,
ICIP04(II: 1161-1164).
IEEE DOI Link 0505
BibRef

Sullivan, K., Bi, Z., Madhow, U., Chandrosekaran, S., Manjunath, B.S.,
Steganalysis of quantization index modulation data hiding,
ICIP04(II: 1165-1168).
IEEE DOI Link 0505
BibRef

Chae, J.J., Mukherjee, D., Manjunath, B.S.,
Color image embedding using multidimensional lattice structures,
ICIP98(I: 460-464).
IEEE DOI Link 9810
BibRef

Gou, H.M.[Hong-Mei], Wu, M.[Min],
Data hiding in curves for collusion-resistant digital fingerprinting,
ICIP04(I: 51-54).
IEEE DOI Link 0505
BibRef

Jiang, M.[Ming], Memon, N., Wong, E., Wu, X.L.[Xiao-Lin],
Quantitative steganalysis of binary images,
ICIP04(I: 29-32).
IEEE DOI Link 0505
BibRef

Solanki, K., Madhow, U., Manjunath, B.S., Chandrasekaran, S.,
Estimating and undoing rotation for print-scan resilient data hiding,
ICIP04(I: 39-42).
IEEE DOI Link 0505
BibRef

Liu, T.H.[Tung-Hsiang], Chang, L.W.[Long-Wen],
An adaptive data hiding technique for binary images,
ICPR04(IV: 831-834).
IEEE DOI Link 0409
BibRef

Yu, X.Y.[Xiao-Yi], Wang, Y.H.[Yun-Hong], Tan, T.N.[Tie-Niu],
On estimation of secret message length in jsteg-like steganography,
ICPR04(IV: 673-676).
IEEE DOI Link 0409
BibRef

Yu, X.Y.[Xiao-Yi], Wang, Y.H.[Yun-Hong], Tan, T.N.[Tie-Niu],
Steganalysis of data hiding in binary images,
ICPR04(IV: 877-880).
IEEE DOI Link 0409
BibRef

Yi, Y.[Yu], Lee, M.H.[Moon Ho], Kim, J.H.[Ji Hyun], Hwang, G.Y.[Gi Yean],
Robust Wavelet-Based Information Hiding through Low-Density Parity-Check (LDPC) Codes,
DW03(117-128).
WWW Version. 0405
BibRef

Sion, R.[Radu], Atallah, M.[Mikhail], Prabhakar, S.I.[Sun-Il],
Resilient Information Hiding for Abstract Semi-structures,
DW03(141-153).
WWW Version. 0405
BibRef

Jung, Y.J.[Yong Ju], Kang, H.K.[Ho Kyung], Ro, Y.M.[Yong Man],
Metadata Hiding for Content Adaptation,
DW03(435-446).
WWW Version. 0405
BibRef

Choo, H.G.[Hyon-Gon], Kim, W.Y.[Whoi-Yul],
Data-Hiding Capacity Improvement for Text Watermarking Using Space Coding Method,
DW03(593-599).
WWW Version. 0405
BibRef

Yu, J.J.[Jeong Jae], Han, J.W.[Jae Won], Lee, K.S.[Kwang Su], O, S.C.[Seung Cheol], Lee, S.J.[Sang-Jin], Park, I.H.[Il Hwan],
A Secure Steganographic Scheme against Statistical Analyses,
DW03(497-507).
WWW Version. 0405
BibRef

Chang, K.[Kisik], Jung, C.H.[Chang-Ho], Lee, S.J.[Sang-Jin], Yang, W.[Wooil],
High Quality Perceptual Steganographic Techniques,
DW03(518-531).
WWW Version. 0405
BibRef

Sallee, P.[Phil],
Model-Based Steganography,
DW03(154-167).
WWW Version. 0405
BibRef

Thomos, N.T., Boulgouris, N.V., Simitopoulos, D.E., Strintzis, M.G.,
List Viterbi Decoding of Convolutional Codes for Efficient Data Hiding,
ICIP02(III: 461-464).
IEEE DOI Link 0210
BibRef

Pérez-González, F.[Fernando],
The Importance of Aliasing in Structured Quantization Index Modulation Data Hiding,
DW03(1-17).
WWW Version. 0405
BibRef

Perez-Gonzalez, F., Balado, F.,
Quantized projection data hiding,
ICIP02(II: 889-892).
IEEE DOI Link 0210
BibRef

Farid, H.,
Detecting hidden messages using higher-order statistical models,
ICIP02(II: 905-908).
IEEE DOI Link 0210
BibRef

Lin, C.Y., Chang, S.F.,
Zero-error Information Hiding Capacity of Digital Images,
ICIP01(III: 1007-1010).
IEEE DOI Link 0108
BibRef

Silvestre, G.,
Embedding Data in Digital Images Using CDMA Techniques,
ICIP00(Vol I: 589-592).
IEEE DOI Link 0008
BibRef

Masry, M.A., Ramos, M., Hemami, S.S.,
Robust Data Hiding Using Psychovisual Thresholding,
ICIP00(Vol I: 593-596).
IEEE DOI Link 0008
BibRef

Ding, W.[Wei], Yan, W.Q.[Wei-Qi], Qi, D.X.[Dong-Xu],
A Novel Digital Image Hiding Technology Based on Tangram and Conway's Game,
ICIP00(Vol I: 601-604).
IEEE DOI Link 0008
BibRef

Abdulaziz, N., Pang, K.,
Performance Evaluation of Data Hiding System Using Wavelet Transform and Error-control Coding,
ICIP00(Vol I: 605-608).
IEEE DOI Link 0008
BibRef

Alturki, F.T.[Faisal T.], Mersereauu, R.M.[Russell M.],
Secure Blind Image Steganographic Technique Using Discrete Fourier Transformation,
ICIP01(II: 542-545).
IEEE DOI Link 0108
BibRef

Sehgal, A., Jagmohan, A., Ahuja, N.,
High Capacity Data Embedding in the Wavelet Domain,
ICIP01(III: 979-982).
IEEE DOI Link 0108
BibRef

Ramkumar, M.[Mahalingam], Akansu, A.N.[Ali N.], Alatan, A.A.[A. Aydin],
A Robust Data Hiding Scheme for Images Using DFT,
ICIP99(II:211-215).
IEEE DOI Link BibRef 9900

Chotikakamthorn, N.[Nopporn],
Document Image Data hiding Technique Using Character Spacing Width Sequence Coding,
ICIP99(II:250-254).
IEEE DOI Link BibRef 9900

Fleet, D.J., and Heeger, D.,
Embedding Invisible Information in Color Images,
ICIP97(I: 532-535).
IEEE DOI Link
Postscript Version. BibRef 9700

Hsu, C.T.[Chiou-Ting], Wu, J.L.[Ja-Ling],
Hidden signatures in images,
ICIP96(III: 223-226).
IEEE DOI Link 9610
BibRef

Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Data Hiding, Steganography, LSB, Least Significant Bit .


Last update:Apr 12, 2014 at 21:44:02