23.3.8 Image Hiding, Data Hiding, Steganography, Steganalysis

Chapter Contents (Back)
Steganography. Steganalysis. Data Hiding. Image Hiding. Many of the more specific papers are separated out: See also Reversible Data Hiding. See also Data Hiding, Steganography, LSB, Least Significant Bit. See also Halftone Images, Compressed Images: Image Hiding, Data Hiding, Steganography. See also Video Data Hiding, Data Hiding in Video, Video Steganography.

Xydeag, C.S., Kostic, B., Steele, R.,
Embedding Data into Pictures by Modulo Masking,
Commun(32), 1984, pp. 56-69. BibRef 8400

Wu, D.C.[Da-Chun], Tsai, W.H.[Wen-Hsiang],
Spatial-domain image hiding in using image differencing,
VISP(147), No. 1, February 2000, pp. 29. 0005
BibRef

Wu, D.C.[Da-Chun], Tsai, W.H.[Wen-Hsiang],
A steganographic method for images by pixel-value differencing,
PRL(24), No. 9-10, June 2003, pp. 1613-1626.
WWW Version. 0304
BibRef

Lee, I.S.[I-Shi], Tsai, W.H.[Wen-Hsiang],
Data Hiding in Binary Images with Distortion-Minimizing Capabilities by Optimal Block Pattern Coding and Dynamic Programming Techniques,
IEICE(E90-D), No. 8, August 2007, pp. 1142-1150.
DOI Link 0708
BibRef

Lee, I.S.[I-Shi], Tsai, W.H.[Wen-Hsiang],
Data hiding in grayscale images by dynamic programming based on a human visual model,
PR(42), No. 7, July 2009, pp. 1604-1611.
Elsevier DOI Link 0903
Data hiding; Grayscale image; Human visual system; Block pattern encoding; Dynamic programming BibRef

Lee, Y.L.[Ya-Lin], Tsai, W.H.[Wen-Hsiang],
A New Secure Image Transmission Technique via Secret-Fragment-Visible Mosaic Images by Nearly Reversible Color Transformations,
CirSysVideo(24), No. 4, April 2014, pp. 695-703.
IEEE DOI Link 1405
data encapsulation BibRef

Li, Y.L.[Ya-Lin], Tsai, W.H.[Wen-Hsiang],
New Image Steganography via Secret-Fragment-Visible Mosaic Images by Nearly-Reversible Color Transformation,
ISVC11(II: 64-74).
Springer DOI Link 1109
BibRef

Lee, Y.K.[Yeuan-Kuen], Chen, L.H.[Ling-Hwei],
High capacity image steganographic model,
VISP(147), No. 3, 2000, pp. 288. 0008
BibRef

Wang, R.Z.[Ran-Zan], Chen, Y.S.[Yeh-Shun],
High-payload image steganography using two-way block matching,
SPLetters(13), No. 3, March 2006, pp. 161-164.
IEEE DOI Link 0604
BibRef

Wang, R.Z.[Ran-Zan], Su, C.H.[Chin-Hui],
Secret image sharing with smaller shadow images,
PRL(27), No. 6, 15 April 2006, pp. 551-555.
WWW Version. Secret sharing; Image sharing; Shadow image; Data hiding 0604
BibRef

Lin, Y.Y.[Yung-Yi], Wang, R.Z.[Ran-Zan],
Scalable Secret Image Sharing With Smaller Shadow Images,
SPLetters(17), No. 1, January 2010, pp. 245-248.
IEEE DOI Link 1001
BibRef

Wang, R.Z.[Ran-Zan], Chien, Y.F.[Yin-Fang], Lin, Y.Y.[Yung-Yi],
Scalable user-friendly image sharing,
JVCIR(21), No. 7, October 2010, pp. 751-761.
Elsevier DOI Link 1003
Image sharing; Secret sharing; Secret image sharing; User-friendly shadow image; Progressive reconstruction; Scalable sharing; Visual cryptography; Visual secret sharing BibRef

Fridrich, J.[Jessica], Goljan, M.[Miroslav], Du, R.[Rui],
Lossless Data Embedding: New Paradigm in Digital Watermarking,
JASP(2002), No. 2, 2002, pp. 185-196. 0202
BibRef

Huang, J.W.[Ji-Wu], Shi, Y.Q.[Yun Q.],
Reliable information bit hiding,
CirSysVideo(12), No. 10, October 2002, pp. 916-920.
IEEE Top Reference. 0212
BibRef

Avcibas, I.[Ismail], Memon, N.[Nasir], Sankur, B.[Bülent],
Steganalysis using image quality metrics,
IP(12), No. 2, February 2003, pp. 221-229.
IEEE DOI Link 0304
BibRef

Avcibas, I.[Ismail], Kharrazi, M.[Mehdi], Memon, N.[Nasir], Sankur, B.[Bülent],
Image Steganalysis with Binary Similarity Measures,
JASP(2005), No. 17, 2005, pp. 2749-2757.
WWW Version. 0603
BibRef
Earlier: A1, A3, A4 only: ICIP02(III: 645-648).
IEEE DOI Link 0210
See also Steganalytic Features for JPEG Compression-Based Perturbed Quantization. BibRef

Bayram, S.[Sevinc], Dirik, A.E.[Ahmet Emir], Sencar, H.T.[Husrev Taha], Memon, N.[Nasir],
An Ensemble of Classifiers Approach to Steganalysis,
ICPR10(4376-4379).
IEEE DOI Link 1008
BibRef

Kharrazi, M., Sencar, H.T., Memon, N.,
Cover Selection for Steganographic Embedding,
ICIP06(117-120).
IEEE DOI Link 0610
BibRef

Chandramouli, R.[Rajarathnam], Kharrazi, M.[Mehdi], Memon, N.[Nasir],
Image Steganography and Steganalysis: Concepts and Practice,
DW03(35-49).
WWW Version. 0405
BibRef

Dumitrescu, S., Wu, X.L.[Xiao-Lin], Memon, N.,
On steganalysis of random LSB embedding in continuous-tone images,
ICIP02(III: 641-644).
IEEE DOI Link 0210
BibRef

Kim, H.J.[Hyoung Joong], Choi, Y.H.[Yong Hee],
A novel echo-hiding scheme with backward and forward kernels,
CirSysVideo(13), No. 8, August 2003, pp. 885-889.
IEEE Abstract. 0309
BibRef

Thien, C.C.[Chih-Ching], Lin, J.C.[Ja-Chen],
A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function,
PR(36), No. 12, December 2003, pp. 2875-2881.
WWW Version. 0310
BibRef

Thien, C.C., Lin, J.C.[Ja-Chen],
An image-sharing method with user-friendly shadow images,
CirSysVideo(13), No. 12, December 2003, pp. 1161-1169.
IEEE Abstract. 0402
BibRef

Jain, A.K.[Anil K.], Uludag, U.[Umut],
Hiding Biometric Data,
PAMI(25), No. 11, November 2003, pp. 1494-1498.
IEEE Abstract. 0311
Biometrics. How to establish the authenticity of the biometric data itself. Biometric data is not replaceable or secret. Hide the data (eigen face coefficients or fingerprints) itself in images. BibRef

Jain, A.K., Uludag, U., Hsu, R.L.[Rein-Lien],
Hiding a face in a fingerprint image,
ICPR02(III: 756-759).
IEEE DOI Link 0211
BibRef

Zhang, X.P.[Xin-Peng], Wang, S.Z.[Shuo-Zhong],
Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security,
PRL(25), No. 3, February 2004, pp. 331-339.
WWW Version. 0401
BibRef

Zhang, X.P.[Xin-Peng], Wang, S.Z.[Shuo-Zhong],
Steganography using multiple-base notational system and human vision sensitivity,
SPLetters(12), No. 1, January 2005, pp. 67-70.
IEEE Abstract. 0501
BibRef

Zhang, X.P.[Xin-Peng], Wang, S.Z.[Shuo-Zhong],
Dynamical running coding in digital steganography,
SPLetters(13), No. 3, March 2006, pp. 165-168.
IEEE DOI Link 0604
BibRef

Zhang, X.P.[Xin-Peng], Wang, S.Z.[Shuo-Zhong], Zhou, Z.Y.[Zhen-Yu],
Multibit Assignment Steganography in Palette Images,
SPLetters(15), No. 1, 2008, pp. 553-556.
IEEE DOI Link 0811
BibRef

Wu, M.Y.[Mei-Yi], Ho, Y.K.[Yu-Kun], Lee, J.H.[Jia-Hong],
An iterative method of palette-based image steganography,
PRL(25), No. 3, February 2004, pp. 301-309.
WWW Version. 0401
BibRef
Earlier:
A Method to Improve the Stego-Image Quality for Palette-Based Image Steganography,
DW03(483-496).
WWW Version. 0405
BibRef

Ho, Y.K.[Yu-Kuen], Wu, M.Y.[Mei-Yi],
Robust object-based watermarking scheme via shape self-similarity segmentation,
PRL(25), No. 15, November 2004, pp. 1673-1680.
WWW Version. 0411
BibRef

Yang, C.N.[Ching-Nung],
New visual secret sharing schemes using probabilistic method,
PRL(25), No. 4, March 2004, pp. 481-494.
WWW Version. 0402
BibRef

Yang, C.N.[Ching-Nung], Chen, T.S.[Tse-Shih],
Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion,
PRL(26), No. 2, 15 January 2005, pp. 193-206.
WWW Version. 0501
BibRef
And:
Extended Visual Secret Sharing Schemes with High-Quality Shadow Images Using Gray Sub Pixels,
ICIAR05(1184-1191).
Springer DOI Link 0509
BibRef
Earlier:
New Aspect Ratio Invariant Visual Secret Sharing Schemes Using Square Block-Wise Operation,
ICIAR05(1167-1174).
Springer DOI Link 0509
BibRef

Yang, C.N.[Ching-Nung], Chen, T.S.[Tse-Shih],
Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation,
PR(39), No. 7, July 2006, pp. 1300-1314.
WWW Version. 0606
BibRef
And:
Visual Secret Sharing Scheme: Improving the Contrast of a Recovered Image Via Different Pixel Expansions,
ICIAR06(I: 468-479).
Springer DOI Link 0610
Visual secret sharing; Visual cryptography; Secret image sharing BibRef

Bastug, A., Sankur, B.,
Improving the Payload of Watermarking Channels via LDPC Coding,
SPLetters(11), No. 2, February 2004, pp. 90-92.
IEEE Abstract. 0402
BibRef

Wu, Y.S.[Yu-Shan], Thien, C.C.[Chih-Ching], Lin, J.C.[Ja-Chen],
Sharing and hiding secret images with size constraint,
PR(37), No. 7, July 2004, pp. 1377-1385.
WWW Version. 0405
BibRef

Wang, Y.L.[Yu-Lin], Pearmain, A.[Alan],
Blind image data hiding based on self reference,
PRL(25), No. 15, November 2004, pp. 1681-1689.
WWW Version. 0411
See also Blind MPEG-2 Video Watermarking Robust Against Geometric Attacks: A Set of Approaches in DCT Domain. BibRef

Solanki, K., Jacobsen, N., Madhow, U., Manjunath, B.S., Chandrasekaran, S.,
Robust image-adaptive data hiding using erasure and error correction,
IP(13), No. 12, December 2004, pp. 1627-1639.
IEEE DOI Link 0412
BibRef

Sullivan, K., Solanki, K., Manjunath, B.S., Madhow, U., Chandrasekaran, S.,
Determining Achievable Rates for Secure, Zero Divergence, Steganography,
ICIP06(121-124).
IEEE DOI Link 0610
BibRef
And: A2, A1, A4, A3, A5:
Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration,
ICIP06(125-128).
IEEE DOI Link 0610
BibRef

Solanki, K., Dabeer, O., Manjunath, B.S., Madhow, U., Chandrasekaran, S.,
A joint source-channel coding scheme for image-in-image data hiding,
ICIP03(II: 743-746).
IEEE Abstract. 0312
BibRef

Brisbane, G., Safavi-Naini, R., Ogunbona, P.,
High-capacity steganography using a shared colour palette,
VISP(152), No. 6, December 2005, pp. 787-792.
DOI Link 0512
BibRef

Alghoniemy, M., Tewfik, A.H.,
Progressive Quantized Projection Approach to Data Hiding,
IP(15), No. 2, February 2006, pp. 459-472.
IEEE DOI Link 0602
See also Geometric Invariance in image watermarking. BibRef

Lan, T.H., Tewfik, A.H.,
A Novel High-Capacity Data-Embedding System,
IP(15), No. 8, August 2006, pp. 2431-2440.
IEEE DOI Link 0606
BibRef

Wu, Y.T., Shih, F.Y.,
Genetic Algorithm Based Methodology for Breaking the Steganalytic Systems,
SMC-B(36), No. 1, February 2006, pp. 24-31.
IEEE DOI Link 0602
See also Enhancement of image watermark retrieval based on genetic algorithms. BibRef

Li, S.L.[Suk-Ling], Leung, K.C.[Kai-Chi], Cheng, L.M., Chan, C.K.[Chi-Kwong],
A novel image-hiding scheme based on block difference,
PR(39), No. 6, June 2006, pp. 1168-1176.
WWW Version. 0604
BibRef
Earlier: A4, A3, A2, A1:
Image hiding based on block difference,
ICARCV04(II: 968-972).
IEEE DOI Link 0412
Image hiding; Block difference BibRef

Comesana, P.[Pedro], Perez-Gonzalez, F.[Fernando],
The Impact of the Cropping Attack on Scalar STDM Data Hiding,
SPLetters(13), No. 6, June 2006, pp. 353-356.
IEEE DOI Link 0606
BibRef

Meinecke, F.C.[Frank C.], Harmeling, S.[Stefan], Müller, K.R.[Klaus-Robert],
Inlier-based ICA with an application to superimposed images,
IJIST(15), No. 1, 2005, pp. 48-55.
DOI Link 0507
BibRef

Meinecke, F.C.[Frank C.], von Bunau, P.[Paul], Kawanabe, M.[Motoaki], Muller, K.R.[Klaus-R.],
Learning invariances with Stationary Subspace Analysis,
Subspace09(87-92).
IEEE DOI Link 0910
BibRef

Shie, S.C.[Shih-Chieh], Jiang, J.H.[Ji-Han], Chen, L.T.[Long-Tai], Huang, Z.H.[Zeng-Hui],
Secret Image Transmission Scheme Using Secret Codebook,
IEICE(E93-D), No. 2, February 2010, pp. 399-402.
WWW Version. 1002
BibRef

Lee, C.C.A.[Chih-Chi-Ang], Wu, H.C.[Hsien-Chu], Tsai, C.S.[Chwei-Shyong], Chu, Y.P.[Yen-Ping],
Adaptive lossless steganographic scheme with centralized difference expansion,
PR(41), No. 6, June 2008, pp. 2097-2106.
WWW Version. 0802
Digital watermarking; Steganography; Lossless data embedding; Difference expansion; Invertible authentication watermark BibRef

Feng, J.B.[Jen-Bang], Wu, H.C.[Hsien-Chu], Tsai, C.S.[Chwei-Shyong], Chang, Y.F.[Ya-Fen], Chu, Y.P.[Yen-Ping],
Visual secret sharing for multiple secrets,
PR(41), No. 12, December 2008, pp. 3572-3581.
WWW Version. 0810
Visual cryptography; Visual secret sharing; Multiple secret sharing; Visual pattern BibRef

Zhang, X.P.[Xiao-Ping], Li, K.[Kan], Wang, X.F.[Xiao-Feng],
A Novel Look-Up Table Design Method for Data Hiding With Reduced Distortion,
CirSysVideo(18), No. 6, June 2008, pp. 769-776.
IEEE DOI Link 0711
BibRef

Li, B., Fang, Y., Huang, J.,
Steganalysis of Multiple-Base Notational System Steganography,
SPLetters(15), No. 1, 2008, pp. 493-496.
IEEE DOI Link 0806
BibRef

Gang, L.T.[Li-Tao], Akansu, A.N.[Ali N.],
Cover Noise Interference Suppression In Multimedia Data Hiding,
IJIG(5), No. 1, January 2005, pp. 191-207. 0501
BibRef

Voloshynovskiy, S.[Sviatoslav], Deguillaume, F.[Frederic], Koval, O.[Oleksiy], Pun, T.[Thierry],
Information-theoretic Data-hiding: Recent Achievements And Open Problems,
IJIG(5), No. 1, January 2005, pp. 5-35. 0501
BibRef

Sallee, P.[Phil],
Model-based Methods For Steganography And Steganalysis,
IJIG(5), No. 1, January 2005, pp. 167-189. 0501
BibRef

Chang, C.C.[Chin-Chen], Hsieh, Y.P.[Yi-Pei], Lin, C.H.[Chia-Hsuan],
Sharing secrets in stego images with authentication,
PR(41), No. 10, October 2008, pp. 3130-3137.
WWW Version. 0808
Steganography; Authentication; Secret image sharing; (k,n) Threshold See also comment on Sharing secrets in stego images with authentication, A. BibRef

Chang, C.C.[Chin-Chen], Hsieh, Y.P.[Yi-Pei],
Authors reply `Sharing secrets in stego images with authentication',
PR(42), No. 7, July 2009, pp. 1620-1621.
Elsevier DOI Link 0903
See also comment on Sharing secrets in stego images with authentication, A. BibRef

Lee, C.F.[Chin-Feng], Chang, C.C.[Chin-Chen], Wang, K.H.[Kuo-Hua],
An improvement of EMD embedding method for large payloads by pixel segmentation strategy,
IVC(26), No. 12, 1 December 2008, pp. 1670-1676.
WWW Version. 0810
Covert communication; Digit steganography; Data hiding; Embedding capacity EMD: Empirical mode decomposition BibRef

Lee, C.F.[Chin-Feng], Chen, H.L.[Hsing-Ling], Lai, S.H.[Shu-Hua],
An adaptive data hiding scheme with high embedding capacity and visual image quality based on SMVQ prediction through classification codebooks,
IVC(28), No. 8, August 2010, pp. 1293-1302.
Elsevier DOI Link 1006
Data hiding; Image quality of stego-image; Embedding capacity; Side-match vector quantization; SMVQ prediction BibRef

Yang, C.N.[Ching-Nung], Ciou, C.B.[Chuei-Bang],
A comment on 'Sharing secrets in stego images with authentication',
PR(42), No. 7, July 2009, pp. 1615-1619.
Elsevier DOI Link 0903
Secret sharing; Image secret sharing; Steganography; Authentication See also Sharing secrets in stego images with authentication. BibRef

Yang, C.N.[Ching-Nung], Ciou, C.B.[Chuei-Bang],
Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability,
IVC(28), No. 12, December 2010, pp. 1600-1610.
Elsevier DOI Link 1003
Image secret sharing; Visual cryptography; Polynomial-based secret sharing; Lagrange interpolation BibRef

Li, P.[Peng], Ma, P.J.[Pei-Jun], Su, X.H.[Xiao-Hong], Yang, C.N.[Ching-Nung],
Improvements of a two-in-one image secret sharing scheme based on gray mixing model,
JVCIR(23), No. 3, April 2012, pp. 441-453.
Elsevier DOI Link 1203
Image secret sharing; Visual cryptography; Polynomial-based secret sharing; Gray mixing model; Information hiding; Lagrange interpolation; (k,n)-threshold scheme; Image processing BibRef

Liu, N., Amin, P., Subbalakshmi, K.P.,
Security and Robustness Enhancement for Image Data Hiding,
MultMed(9), No. 3, April 2007, pp. 466-474.
IEEE DOI Link 0905
BibRef

Amin, P.[Palak], Subbalakshmi, K.P.,
Detecting Hidden Messages Using Image Power Spectrum,
ICIP07(I: 421-424).
IEEE DOI Link 0709
BibRef

Eslami, Z., Razzaghi, S.H., Ahmadabadi, J.Z.[J. Zarepour],
Secret image sharing based on cellular automata and steganography,
PR(43), No. 1, January 2010, pp. 397-404.
Elsevier DOI Link 0909
Secret sharing scheme; Linear memory cellular automata; Digital signature; Authentication; Verifiability BibRef

Sabeti, V.[Vajiheh], Samavi, S.[Shadrokh], Mahdavi, M.[Mojtaba], Shirani, S.[Shahram],
Steganalysis and payload estimation of embedding in pixel differences using neural networks,
PR(43), No. 1, January 2010, pp. 405-415.
Elsevier DOI Link 0909
Steganography; Steganalysis; Pixel-value differencing; Artificial neural network (ANN); Perceptrons BibRef

Cheng, Y.M.[Yu-Ming], Wang, C.M.[Chung-Ming],
A Novel Approach to Steganography in High- Dynamic-Range Images,
MultMedMag(16), No. 3, July-September 2009, pp. 70-80.
IEEE DOI Link 0909
BibRef

Zeng, X.T.[Xian-Ting], Ping, L.D.[Ling-Di], Pan, X.Z.[Xue-Zeng],
A lossless robust data hiding scheme,
PR(43), No. 4, April 2010, pp. 1656-1667.
Elsevier DOI Link 1002
Lossless data hiding; Watermarking; Steganography; Image processing; Robust lossless data hiding; Semi-fragile authentication BibRef

Rocha, A.[Anderson], Goldenstein, S.K.[Siome K.],
Progressive randomization: Seeing the unseen,
CVIU(114), No. 3, March 2010, pp. 349-362.
Elsevier DOI Link 1003
BibRef
Earlier:
PR: More than Meets the Eye,
ICCV07(1-8).
IEEE DOI Link 0710
Progressive Randomization. Image descriptor for broad categorization. Image inference; Progressive randomization; Image categorization; Image forensics; Steganalysis BibRef

Kalantari, N.K., Ahadi, S.M.,
A Logarithmic Quantization Index Modulation for Perceptually Better Data Hiding,
IP(19), No. 6, June 2010, pp. 1504-1517.
IEEE DOI Link 1006
BibRef

Lin, G.S.[Guo-Shiang], Chang, Y.T., Lie, W.N.[Won-Nuiig],
A Framework of Enhancing Image Steganography With Picture Quality Optimization and Anti-Steganalysis Based on Simulated Annealing Algorithm,
MultMed(12), No. 5, 2010, pp. 345-357.
IEEE DOI Link 1008
BibRef

Chuang, C.H.[Cheng-Hung], Lin, G.S.[Guo-Shiang],
An Optical Video Cryptosystem with Adaptive Steganography,
MVA09(439-).
PDF Version. 0905
BibRef

Lin, S.J.[Sian-Jheng], Chen, S.K.[Shang-Kuan], Lin, J.C.[Ja-Chen],
Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion,
JVCIR(21), No. 8, November 2010, pp. 900-916.
Elsevier DOI Link 1011
Visual cryptography; Flipping; Conditionally optimal contrast; Secret image sharing; Visual secret sharing; Non-expansible; Perfect security; Random grids Encode 2 into 2 transparent layers, superimpose and get one image, flip one and get second image. BibRef

Chen, S.K.[Shang-Kuan], Lin, S.J.[Sian-Jheng],
Optimal (2,n) and (2,infinity) visual secret sharing by generalized random grids,
JVCIR(23), No. 4, May 2012, pp. 677-684.
Elsevier DOI Link 1205
Contrast; Random grids; Visual cryptography; Visual secret sharing; Generalized random grids; Image sharing; Secret image sharing; Optimal contrast BibRef

Jajal, B.[Brijesh], Desai, V.[Vipul],
Identification of copy-paste regions in digital image,
IJIST(20), No. 4, December 2010, pp. 367-369.
DOI Link 1011
Image forensics. BibRef

Hsiao, J.Y.[Ju-Yuan], Chang, C.T.[Chieh-Tse],
An adaptive steganographic method based on the measurement of just noticeable distortion profile,
IVC(29), No. 2-3, February 2011, pp. 155-166.
Elsevier DOI Link 1101
Data hiding; Just noticeable distortion; Steganography; Information hiding BibRef

Hou, C.L., Lu, C., Tsai, S.C., Tzeng, W.G.,
An Optimal Data Hiding Scheme With Tree-Based Parity Check,
IP(20), No. 3, March 2011, pp. 880-886.
IEEE DOI Link 1103
BibRef

Gao, X., An, L., Yuan, Y., Tao, D., Li, X.,
Lossless Data Embedding Using Generalized Statistical Quantity Histogram,
CirSysVideo(21), No. 8, August 2011, pp. 1061-1070.
IEEE DOI Link 1108
BibRef

Guo, C.[Cheng], Chang, C.C.[Chin-Chen], Qin, C.[Chuan],
A hierarchical threshold secret image sharing,
PRL(33), No. 1, 1 January 2012, pp. 83-91.
Elsevier DOI Link 1112
Hierarchical threshold; Distortion-free; Secret image sharing; Access structure BibRef

Guo, C.[Cheng], Chang, C.C.[Chin-Chen], Qin, C.[Chuan],
A multi-threshold secret image sharing scheme based on MSP,
PRL(33), No. 12, 1 September 2012, pp. 1594-1600.
Elsevier DOI Link 1208
Multi-threshold secret sharing; Access structure; Secret image sharing; Monotone span programs BibRef

Lee, C.W., Tsai, W.H.[Wen-Hsiang],
A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability,
IP(21), No. 1, January 2012, pp. 207-218.
IEEE DOI Link 1112
BibRef

Yang, C.N.[Ching-Nung], Wu, C.C.[Chih-Cheng], Lin, Y.C.[Yi-Chin], Kim, C.[Cheonshik],
Enhanced Matrix-Based Secret Image Sharing Scheme,
SPLetters(19), No. 12, December 2012, pp. 789-792.
IEEE DOI Link 1212
BibRef

Varsaki, E.E.[Eleni E.], Fotopoulos, V.[Vassilis], Skodras, A.N.[Athanassios N.],
Data hiding based on image texture classification,
SIViP(7), No. 2, March 2013, pp. 247-253.
WWW Version. 1303
BibRef

Elshoura, S.M., Megherbi, D.B.,
A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments,
SP:IC(28), No. 5, May 2013, pp. 531-552.
Elsevier DOI Link 1305
Information hiding; Image processing; Steganography; Multi-media computing; Secret communication; Image watermarking; Secret information content verification and authentication; Tchebichef moments BibRef

Elshoura, S.M., Megherbi, D.B.,
Analysis of noise sensitivity of Tchebichef and Zernike moments with application to image watermarking,
JVCIR(24), No. 5, July 2013, pp. 567-578.
Elsevier DOI Link 1306
Sensitivity; Noise sensitivity; Tchebichef moments; Zernike moments; Image watermarking; Tampering detection; Image reconstruction; Error measurement BibRef

Lee, K.H., Chiu, P.L.,
Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints,
IP(22), No. 10, 2013, pp. 3830-3841.
IEEE DOI Link 1309
Visual secret sharing scheme BibRef

Li, P.[Peng], Yang, C.N.[Ching-Nung], Wu, C.C.[Chih-Cheng], Kong, Q.[Qian], Ma, Y.[Yanpeng],
Essential secret image sharing scheme with different importance of shadows,
JVCIR(24), No. 7, 2013, pp. 1106-1114.
Elsevier DOI Link 1309
Secret sharing BibRef

Mohd, B.J.[Bassam Jamil], Abed, S.[Sa'ed], Na'ami, B.[Bassam], Hayajneh, T.[Thaier],
Hierarchical steganography using novel optimum quantization technique,
SIViP(7), No. 6, November 2013, pp. 1029-1040.
Springer DOI Link 1310
BibRef

Liu, L.[Li], Wang, A.[Anhong], Chang, C.C.[Chin-Chen], Li, Z.H.[Zhi-Hong],
A novel real-time and progressive secret image sharing with flexible shadows based on compressive sensing,
SP:IC(29), No. 1, 2014, pp. 128-134.
Elsevier DOI Link 1402
Compressed sensing BibRef

Zielinska, E.[Elzbieta], Mazurczyk, W.[Wojciech], Szczypiorski, K.[Krzysztof],
Trends in Steganography,
CACM(56), No. 3, March 2014, pp. 86-95.
DOI Link 1403
Survey, Steganography. Methods for embedding secret data are more sophisticated than their ancient predecessors, but the basic principles remain unchanged. BibRef

Hou, X.D.[Xiao-Dan], Zhang, T.[Tao], Xiong, G.[Gang], Lu, Z.B.[Zhi-Bo], Xie, K.[Kai],
A novel steganalysis framework of heterogeneous images based on GMM clustering,
SP:IC(29), No. 3, 2014, pp. 385-399.
Elsevier DOI Link 1403
Steganalysis BibRef

Chen, J.[Jeanne],
A PVD-based data hiding method with histogram preserving using pixel pair matching,
SP:IC(29), No. 3, 2014, pp. 375-384.
Elsevier DOI Link 1403
Pixel value difference BibRef

Lee, Y.W.[Young-Woon], Heo, J.P.[Jae-Pil], Yoon, S.E.[Sung-Eui],
Quadra-Embedding: Binary Code Embedding with Low Quantization Error,
CVIU(125), No. 1, 2014, pp. 214-222.
Elsevier DOI Link 1406
BibRef
Earlier: ACCV12(II:214-227).
Springer DOI Link 1304
Large-scale image retrieval BibRef

Pakniat, N.[Nasrollah], Noroozi, M.[Mahnaz], Eslami, Z.[Ziba],
Secret image sharing scheme with hierarchical threshold access structure,
JVCIR(25), No. 5, 2014, pp. 1093-1101.
Elsevier DOI Link 1406
Cryptography BibRef

Li, L.X.[Ling-Xiang], Chen, Z.[Zhi], Fang, J.[Jun],
On Secrecy Capacity of Gaussian Wiretap Channel Aided by A Cooperative Jammer,
SPLetters(21), No. 11, November 2014, pp. 1356-1360.
IEEE DOI Link 1408
Gaussian channels BibRef


Ou, D.[Duanhao], Wu, X.T.[Xiao-Tian], Dai, L.[Lu], Sun, W.[Wei],
Secret Sharing in Images Based on Error-Diffused Block Truncation Coding and Error Diffusion,
IWDW13(123-138).
Springer DOI Link 1407
BibRef

Liu, S.[Shenchuan], Fujiyoshi, M.[Masaaki], Kiya, H.[Hitoshi],
A Cheat-Prevention Visual Secret Sharing Scheme with Minimum Pixel Expansion,
IWDW13(362-375).
Springer DOI Link 1407
BibRef

Johnson, B.[Benjamin], Schöttle, P.[Pascal], Laszka, A.[Aron], Grossklags, J.[Jens], Böhme, R.[Rainer],
Bitspotting: Detecting Optimal Adaptive Steganography,
IWDW13(3-18).
Springer DOI Link 1407
BibRef

Feng, B.[Bingwen], Lu, W.[Wei], Sun, W.[Wei],
High Capacity Data Hiding Scheme for Binary Images Based on Minimizing Flipping Distortion,
IWDW13(514-528).
Springer DOI Link 1407
BibRef

Zhang, H.[Hong], Guan, Q.[Qingxiao], Zhao, X.F.[Xian-Feng],
Steganography Based on Adaptive Pixel-Value Differencing Scheme Revisited,
IWDW13(32-47).
Springer DOI Link 1407
BibRef

Singh, R.K., Lall, B.,
Saliency map based image steganography,
IVCNZ13(430-435)
IEEE DOI Link 1402
image watermarking BibRef

Zeng, Y.C.[Yi-Chong], Tsai, C.H.[Chi-Hung],
High capacity multi-scale image sharing scheme by combining visual cryptography with data hiding,
ICIP13(4536-4539)
IEEE DOI Link 1402
Visual cryptography; capacity; data hiding; downscaling; secret sharing BibRef

Wilkowski, A.[Artur], Kasprzak, W.[Wlodzimierz],
Steganographic Authentication Method for Electronic IDs,
ICIAR13(726-733).
Springer DOI Link 1307
BibRef

Najeena, K.S., Imran, B.M.,
An efficient steganographic technique based on chaotic maps and adpative PPM embedding,
ICSIPR13(293-297).
IEEE DOI Link 1304
BibRef

Nadiya, P.V., Imran, B.M.[B. Mohammed],
Image steganography in DWT domain using double-stegging with RSA encryption,
ICSIPR13(283-287).
IEEE DOI Link 1304
BibRef

Chaumont, M.[Marc], Kouider, S.[Sarra],
Steganalysis by ensemble classifiers with boosting by regression, and post-selection of features,
ICIP12(1133-1136).
IEEE DOI Link 1302
BibRef

Tan, S.Q.[Shun-Quan], Li, B.[Bin],
Targeted steganalysis of adaptive pixel-value differencing steganography,
ICIP12(1129-1132).
IEEE DOI Link 1302
BibRef

Mainberger, M.[Markus], Schmaltz, C.[Christian], Berg, M.[Matthias], Weickert, J.[Joachim], Backes, M.[Michael],
Diffusion-based Image Compression in Steganography,
ISVC12(II: 219-228).
Springer DOI Link 1209
BibRef

Wang, X.F.[Xiao-Feng], Li, Z.[Zhen], Zhang, X.[Xiaoni], Wang, S.P.[Shang-Ping], Chen, J.[Jing],
(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images,
IWDW11(425-438).
Springer DOI Link 1208
BibRef

Wang, H.T.[Hong-Tao], Liu, M.[Meng], Li, Q.[Qian], Yang, H.T.[Hai-Tao], Li, H.Q.A.[Hou-Qi-Ang],
Region based motion vector prediction using data hiding and decoder side reasoning,
VCIP11(1-4).
IEEE DOI Link 1201
BibRef

Niimi, M.[Michiharu], Noda, H.[Hideki],
An application of Sparse Code Shrinkage to image steganalysis based on supervised learning,
ICIP11(1941-1944).
IEEE DOI Link 1201
BibRef

Guan, Q.X.[Qing-Xiao], Dong, J.[Jing], Tan, T.N.[Tie-Niu],
An effective image steganalysis method based on neighborhood information of pixels,
ICIP11(2721-2724).
IEEE DOI Link 1201
BibRef

Suresh, N.[Nakum], Karthik, K.[Kannan],
Secure fingerprint embedding based on modified GDFT based parametric transform,
ICIIP11(1-6).
IEEE DOI Link 1112
BibRef

Sharma, M.[Manoj], Shukla, M.[Manoj], Kaul, A.[Amit],
Image hiding using unitary similarity transformation,
ICIIP11(1-4).
IEEE DOI Link 1112
BibRef

Basu, A.[Abhishek], Das, T.S.[Tirtha Sankar], Sarkar, S.K.[Subir Kumar], Majumder, S.[Swanirbhar],
On the implementation of a information hiding design based on saliency map,
ICIIP11(1-6).
IEEE DOI Link 1112
BibRef

Arya, M.S.[Meenakshi S], Jain, N.[Nikita], Sisodia, J.[Jai], Sehgal, N.[Nukul],
DNA encoding based feature extraction for biometric watermarking,
ICIIP11(1-6).
IEEE DOI Link 1112
BibRef

Kavehvash, Z.[Zahra], Ghaemmaghami, S.[Shahrokh],
On Limits of Embedding in 3D Images Based on 2D Watson's Model,
DW10(293-304).
Springer DOI Link 1010
BibRef

Liwicki, M.[Marcus], Uchida, S.[Seiichi], Iwamura, M.[Masakazu], Omachi, S.[Shinichiro], Kise, K.[Koichi],
Embedding Meta-Information in Handwriting: Reed-Solomon for Reliable Error Correction,
FHR10(51-56).
IEEE DOI Link 1011
BibRef

Wang, J.X.[Jun-Xiang], Ni, J.Q.[Jiang-Qun],
A fast performance estimation scheme for histogram shifting based multi-layer embedding,
ICIP10(3701-3704).
IEEE DOI Link 1009
a lossless data hiding scheme. Limited capacity. BibRef

Guo, M.[Meng], Zhang, H.B.[Hong-Bin],
High Capacity Data Hiding for Binary Image Authentication,
ICPR10(1441-1444).
IEEE DOI Link 1008
BibRef

Huang, C.P.[Chin-Pan],
A new scheme of sharing secrets in stego images with authentication,
ICIP09(1269-1272).
IEEE DOI Link 0911
BibRef

Gao, Y.K.[Yun-Kai], Li, X.L.[Xiao-Long], Zeng, T.Y.[Tie-Yong], Yang, B.[Bin],
Improving embedding efficiency via matrix embedding: A case study,
ICIP09(109-112).
IEEE DOI Link 0911
BibRef

Gul, G.[Gokhan], Kurugollu, F.[Fatih],
A novel universal steganalyser design: 'LogSv',
ICIP09(4249-4252).
IEEE DOI Link 0911
BibRef

Yu, X.Y.[Xiao Yi], Wang, A.[Aiming],
An improved lossless data hiding based on space filling curves,
ICIP09(4221-4224).
IEEE DOI Link 0911
BibRef

Mayer, J.[Joceli], Bermudez, J.C.M., Legg, A.P., Uchoa-Filho, B.F., Mukherjee, D., Said, A., Samadani, R., Simske, S.,
Design of high capacity 3D print codes aiming for robustness to the PS channel and external distortions,
ICIP09(105-108).
IEEE DOI Link 0911
Adding high-density information to printed document. BibRef

Nabaee, H., Faez, K.,
An efficient steganography method based on reducing changes,
IVCNZ10(1-7).
IEEE DOI Link 1203
BibRef

Famili, Z.[Zainab], Faez, K.[Karim], Fadavi, A.[Abbas],
A New Steganography Based on L2 Technic,
CIARP09(1062-1069).
Springer DOI Link 0911
BibRef

Deng, Q.L.[Qian-Lan], Lin, J.J.[Jia-Jun],
A Universal Steganalysis Using Features Derived from the Differential Image Histogram in Frequency Domain,
CISP09(1-4).
IEEE DOI Link 0910
BibRef

Zhang, L.[Liang],
Wavelet Domain Steganalysis Based on Predictability Analysis and Magnitude Prediction,
CISP09(1-4).
IEEE DOI Link 0910
BibRef

Yu, X.Y.[Xiao Yi], Wang, A.[Aiming],
Steganography with Hash,
CISP09(1-4).
IEEE DOI Link 0910
BibRef
And:
Steganalysis Based on Bayesion Network and Genetic Algorithm,
CISP09(1-4).
IEEE DOI Link 0910
BibRef

Sohn, H.[Hosik], Ro, Y.M.[Yong Man], Plataniotis, K.N.[Kostantinos N.],
Content Sharing Based on Personal Information in Virtually Secured Space,
DW08(388-400).
Springer DOI Link 0811
BibRef

Huang, H.J.[Hua-Jun], Tan, J.S.[Jun-Shan], Sun, X.M.[Xing-Ming], Liu, L.X.[Ling-Xi],
Detection of Hidden Information in Webpage Based on Higher-Order Statistics,
DW08(293-302).
Springer DOI Link 0811
BibRef

Wahab, A.W.A.[Ainuddin Wahid Abdul], Briffa, J.A.[Johann A.], Schaathun, H.G.[Hans Georg],
On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography,
DW08(342-349).
Springer DOI Link 0811
BibRef

Sachnev, V.[Vasily], Kim, H.J.[Hyoung Joong],
An Improved Matrix Encoding Scheme for JPEG Steganography,
IWDW11(3-15).
Springer DOI Link 1208
BibRef
Earlier:
Ternary Data Hiding Technique for JPEG Steganography,
DW10(202-210).
Springer DOI Link 1010
BibRef

Sachnev, V.[Vasiliy], Kim, H.J.[Hyoung Joong], Zhang, R.Y.[Rong-Yue], Choi, Y.S.[Yong Soo],
A Novel Approach for JPEG Steganography,
DW08(209-217).
Springer DOI Link 0811
BibRef

Sun, Y.F.[Yi-Feng], Liu, F.L.[Fen-Lin], Liu, B.[Bin], Wang, P.[Ping],
Steganalysis Based on Difference Image,
DW08(184-198).
Springer DOI Link 0811
BibRef

Li, T.[Ting], Zhao, Y.[Yao], Ni, R.R.[Rong-Rong], Yu, L.F.[Li-Fang],
A High Capacity Steganographic Algorithm in Color Images,
DW08(218-228).
Springer DOI Link 0811
BibRef

Islam, N.[Naveed], Puech, W.[William], Brouzet, R.[Robert],
A Homomorphic Method for Sharing Secret Images,
DW09(121-135).
Springer DOI Link 0908
BibRef

Puhan, N.B., Ho, A.T.S., Sattar, F.,
High Capacity Data Hiding in Binary Document Images,
DW09(149-161).
Springer DOI Link 0908
BibRef

Zheng, X.L.[Xue-Ling], Huang, L.S.[Liu-Sheng], Chen, Z.[Zhili], Yu, Z.S.[Zhen-Shan], Yang, W.[Wei],
Hiding Information by Context-Based Synonym Substitution,
DW09(162-169).
Springer DOI Link 0908
BibRef

Kim, S.[Semin], de Neve, W.[Wesley], Ro, Y.M.[Yong Man],
A Statistical and Iterative Method for Data Hiding in Palette-Based Images,
DW09(170-183).
Springer DOI Link 0908
BibRef

Agrawal, N.[Neha], Savvides, M.[Marios],
Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching,
Biometrics09(85-92).
IEEE DOI Link 0906
BibRef

Shyu, S.J.[Shyong Jian], Chuang, C.C.[Chun-Chieh], Chen, Y.R.[Ying-Ru], Lai, A.F.[Ah-Fur],
Weighted Threshold Secret Image Sharing,
PSIVT09(988-998).
Springer DOI Link 0901
BibRef

Sur, A.[Arijit], Goel, P.[Piyush], Mukhopadhyay, J.[Jayanta],
A New Approach for Reducing Embedding Noise in Multiple Bit Plane Steganography,
ICISP08(580-587).
Springer DOI Link 0807
BibRef

Sarkar, A., Nataraj, L., Manjunath, B.S., Madhow, U.,
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS: A randomized block based hiding scheme,
ICIP08(1292-1295).
IEEE DOI Link 0810
BibRef

Kang, X.G.[Xian-Gui], Zhong, X.[Xiong], Huang, J.W.[Ji-Wu], Zeng, W.J.[Wen-Jun],
An efficient print-scanning resilient data hiding scheme based on a novel LPM,
ICIP08(2080-2083).
IEEE DOI Link 0810
BibRef

Cheddad, A.[Abbas], Condell, J.[Joan], Curran, K.[Kevin], McKevitt, P.[Paul],
Enhancing Steganography in Digital Images,
CRV08(326-332).
IEEE DOI Link 0805
BibRef

Navas, K.A., Aravind, M.L., Sasi Kumar, M.,
A novel quality measure for information hiding in images,
Tensor08(1-5).
IEEE DOI Link 0806
BibRef

Perez-Gonzalez, F.[Fernando], Heileman, G.L.[Greg L.], Abdallah, C.T.[Chaouki T.],
Benford's Law in Image Processing,
ICIP07(I: 405-408).
IEEE DOI Link 0709
Apply to steganalysis. (Detection) (Benford: Lists of numbers by digit, the low digits dominate -- leading digit is most often 1) BibRef

Gou, H.M.[Hong-Mei], Wu, M.[Min],
Improving Embedding Payload in Binary Imageswith 'Super-Pixels',
ICIP07(III: 277-280).
IEEE DOI Link 0709
BibRef

Chen, C.H.[Chun-Hua], Shi, Y.Q.[Yun Q.], Xuan, G.R.[Guo-Rong],
Steganalyzing Texture Images,
ICIP07(II: 153-156).
IEEE DOI Link 0709
BibRef

Yu, X.Y.[Xiao-Yi], Zhu, X.S.[Xin-Shan], Babaguchi, N.[Noboru],
Steganography using Sensor Noise and Linear Prediction Synthesis Filter,
ICIP07(II: 157-160).
IEEE DOI Link 0709
BibRef

Sarkar, A., Manjunath, B.S.,
Estimating Steganographic Capacity for Odd-Even Based Embedding and its Use in Individual Compensation,
ICIP07(I: 409-412).
IEEE DOI Link 0709
BibRef

Smith, C.B.[Christopher B.],
Steganalysis using Noise Variance Estimation,
ICIP07(I: 417-420).
IEEE DOI Link 0709
BibRef

Zou, D.K.[De-Kun], Tian, J.[Jun], Bloom, J.A.[Jeffrey A.], Zhai, J.F.[Jie-Fu],
Data Hiding in Film Grain,
DW06(197-211).
Springer DOI Link 0611
BibRef

Kim, Y.H.[Youn-Hee], Duric, Z.[Zoran], Richards, D.[Dana],
Towards Lower Bounds on Embedding Distortion in Information Hiding,
DW06(362-376).
Springer DOI Link 0611
BibRef

Marçal, A.R.S.[André R.S.], Pereira, P.R.[Patricia R.],
A Steganographic Method for Digital Images Robust to RS Steganalysis,
ICIAR05(1192-1199).
Springer DOI Link 0509
BibRef

Lai, B.L.[Bo-Luen], Chang, L.W.[Long-Wen],
Adaptive Data Hiding for Images Based on Harr Discrete Wavelet Transform,
PSIVT06(1085-1093).
Springer DOI Link 0612
BibRef

Xuan, G.R.[Guo-Rong], Shi, Y.Q.[Yun Q.], Huang, C.[Cong], Fu, D.D.[Dong-Dong], Zhu, X.M.[Xiu-Ming], Chai, P.Q.[Pei-Qi], Gao, J.J.[Jian-Jiong],
Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA),
DW06(49-60).
Springer DOI Link 0611
BibRef

Nguyen, B.C.[Bui Cong], Yoon, S.M.[Sang Moon], Lee, H.K.[Heung-Kyu],
Multi Bit Plane Image Steganography,
DW06(61-70).
Springer DOI Link 0611
BibRef

Guan, Q.X.[Qing-Xiao], Dong, J.[Jing], Tan, T.N.[Tie-Niu],
Blind Quantitative Steganalysis Based on Feature Fusion and Gradient Boosting,
DW10(266-279).
Springer DOI Link 1010
BibRef

Dong, J.[Jing], Chen, X.C.[Xiao-Chuan], Guo, L.[Lei], Tan, T.N.[Tie-Niu],
Fusion Based Blind Image Steganalysis by Boosting Feature Selection,
DW07(87-98).
Springer DOI Link 0712
BibRef

Chen, X.C.[Xiao-Chuan], Wang, Y.H.[Yun-Hong], Tan, T.N.[Tie-Niu], Guo, L.[Lei],
Blind Image Steganalysis Based on Statistical Analysis of Empirical Matrix,
ICPR06(III: 1107-1110).
IEEE DOI Link 0609
BibRef

Candan, C.,
A Transcoding Robust Data Hiding Method for Image Communication Applications,
ICIP05(III: 660-663).
IEEE DOI Link 0512
BibRef

Cheng, J., Kot, A.C., Liu, J., Cao, H.,
Detection of Data Hiding in Binary Text Images,
ICIP05(III: 73-76).
IEEE DOI Link 0512
BibRef

Whelan, K.M., Silvestre, G.C.M., Hurley, N.J.,
Iterative Decoding of Scale Invariant Image Data-Hiding,
ICIP05(I: 989-992).
IEEE DOI Link 0512
BibRef

Kimoto, T.,
Designing Template Cells Suitable for Secret-Sharing Halftone Images by Quantitative Analysis,
ICIP06(2593-2596).
IEEE DOI Link 0610
BibRef
Earlier:
Implementation of Level Transformations for Hiding Watermarks in Image Bit-Planes under Limited Level Changes,
ICIP05(I: 253-256).
IEEE DOI Link 0512
BibRef

Yu, X.Y.[Xiao-Yi], Wang, Y.H.[Yun-Hong], Tan, T.N.[Tie-Niu],
Model based steganalysis,
ICIP04(IV: 2625-2628).
IEEE DOI Link 0505
BibRef

Solanki, K., Sullivan, K., Madhow, U., Manjunath, B.S., Chandrasekaran, S.,
Statistical Restoration for Robust and Secure Steganography,
ICIP05(II: 1118-1121).
IEEE DOI Link 0512
BibRef

Wang, X.F.[Xue-Feng], Yao, Z.[Zhen], Li, C.T.[Chang-Tsun],
A Palette-Based Image Steganographic Method Using Colour Quantisation,
ICIP05(II: 1090-1093).
IEEE DOI Link 0512
BibRef

del Rey, A.M.[A. Martín], Sánchez, G.R.[G. Rodríguez], de la Villa-Cuenca, A.,
A Protocol to Cipher Digital Images Based on Cat Maps and Cellular Automata,
IbPRIA07(I: 571-578).
Springer DOI Link 0706
BibRef

del Rey, A.M.[Angel Martín],
A Matrix-Based Secret Sharing Scheme for Images,
CIARP08(635-642).
Springer DOI Link 0809
BibRef
And:
A Secret Sharing Scheme for Digital Images Based on Two-Dimensional Linear Cellular Automata,
IWCIA08(xx-yy).
Springer DOI Link 0804
BibRef

Marańón, G.Á.[Gonzalo Álvarez], Encinas, L.H.[Luis Hernández], del Rey, Á.M.[Ángel Martín],
A New Secret Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata,
IbPRIA05(I:411).
Springer DOI Link 0509
BibRef

Jiang, M.[Ming], Wong, E., Memon, N., Wu, X.L.[Xiao-Lin],
A simple technique for estimating message lengths for additive noise steganography,
ICARCV04(II: 983-986).
IEEE DOI Link 0412
BibRef

Sattar, F., Yu, D.[Dan], Razul, S.G., Krishnan, S.M.,
Transparent information hiding with automatic embedding range selection for ownership verification,
ICIP04(IV: 2657-2660).
IEEE DOI Link 0505
BibRef

Amin, P., Subbalakshuni, K.P.,
Rotation and cropping resilient data hiding with zernike moments,
ICIP04(IV: 2175-2178).
IEEE DOI Link 0505
BibRef

Liu, N.[Ning], Subbalakshun, K.P.,
Non-uniform quantizer design for image data hiding,
ICIP04(IV: 2179-2182).
IEEE DOI Link 0505
BibRef

Xue, G.[Gang], Lu, P.[Peizhong], Wang, J.L.[Jin-Lian],
A Counter-Geometric Distortions Data Hiding Scheme Using Double Channels in Color Images,
DW04(42-54).
WWW Version. 0505
BibRef

Yu, J.J.[Jeong Jae], Jung, C.H.[Chang-Ho], Yoon, S.K.[Seok-Koo], Lee, S.J.[Sang-Jin],
Steganographic Scheme Using a Block Cipher,
DW04(163-170).
WWW Version. 0505
BibRef

Chandramouli, R.,
On information hiding with incomplete information about steganalysis,
ICIP04(II: 1161-1164).
IEEE DOI Link 0505
BibRef

Sullivan, K., Bi, Z., Madhow, U., Chandrosekaran, S., Manjunath, B.S.,
Steganalysis of quantization index modulation data hiding,
ICIP04(II: 1165-1168).
IEEE DOI Link 0505
BibRef

Chae, J.J., Mukherjee, D., Manjunath, B.S.,
Color image embedding using multidimensional lattice structures,
ICIP98(I: 460-464).
IEEE DOI Link 9810
BibRef

Gou, H.M.[Hong-Mei], Wu, M.[Min],
Data hiding in curves for collusion-resistant digital fingerprinting,
ICIP04(I: 51-54).
IEEE DOI Link 0505
BibRef

Jiang, M.[Ming], Memon, N., Wong, E., Wu, X.L.[Xiao-Lin],
Quantitative steganalysis of binary images,
ICIP04(I: 29-32).
IEEE DOI Link 0505
BibRef

Solanki, K., Madhow, U., Manjunath, B.S., Chandrasekaran, S.,
Estimating and undoing rotation for print-scan resilient data hiding,
ICIP04(I: 39-42).
IEEE DOI Link 0505
BibRef

Liu, T.H.[Tung-Hsiang], Chang, L.W.[Long-Wen],
An adaptive data hiding technique for binary images,
ICPR04(IV: 831-834).
IEEE DOI Link 0409
BibRef

Yu, X.Y.[Xiao-Yi], Wang, Y.H.[Yun-Hong], Tan, T.N.[Tie-Niu],
On estimation of secret message length in jsteg-like steganography,
ICPR04(IV: 673-676).
IEEE DOI Link 0409
BibRef

Yu, X.Y.[Xiao-Yi], Wang, Y.H.[Yun-Hong], Tan, T.N.[Tie-Niu],
Steganalysis of data hiding in binary images,
ICPR04(IV: 877-880).
IEEE DOI Link 0409
BibRef

Yi, Y.[Yu], Lee, M.H.[Moon Ho], Kim, J.H.[Ji Hyun], Hwang, G.Y.[Gi Yean],
Robust Wavelet-Based Information Hiding through Low-Density Parity-Check (LDPC) Codes,
DW03(117-128).
WWW Version. 0405
BibRef

Sion, R.[Radu], Atallah, M.[Mikhail], Prabhakar, S.I.[Sun-Il],
Resilient Information Hiding for Abstract Semi-structures,
DW03(141-153).
WWW Version. 0405
BibRef

Jung, Y.J.[Yong Ju], Kang, H.K.[Ho Kyung], Ro, Y.M.[Yong Man],
Metadata Hiding for Content Adaptation,
DW03(435-446).
WWW Version. 0405
BibRef

Choo, H.G.[Hyon-Gon], Kim, W.Y.[Whoi-Yul],
Data-Hiding Capacity Improvement for Text Watermarking Using Space Coding Method,
DW03(593-599).
WWW Version. 0405
BibRef

Yu, J.J.[Jeong Jae], Han, J.W.[Jae Won], Lee, K.S.[Kwang Su], O, S.C.[Seung Cheol], Lee, S.J.[Sang-Jin], Park, I.H.[Il Hwan],
A Secure Steganographic Scheme against Statistical Analyses,
DW03(497-507).
WWW Version. 0405
BibRef

Chang, K.[Kisik], Jung, C.H.[Chang-Ho], Lee, S.J.[Sang-Jin], Yang, W.[Wooil],
High Quality Perceptual Steganographic Techniques,
DW03(518-531).
WWW Version. 0405
BibRef

Sallee, P.[Phil],
Model-Based Steganography,
DW03(154-167).
WWW Version. 0405
BibRef

Thomos, N.T., Boulgouris, N.V., Simitopoulos, D.E., Strintzis, M.G.,
List Viterbi Decoding of Convolutional Codes for Efficient Data Hiding,
ICIP02(III: 461-464).
IEEE DOI Link 0210
BibRef

Pérez-González, F.[Fernando],
The Importance of Aliasing in Structured Quantization Index Modulation Data Hiding,
DW03(1-17).
WWW Version. 0405
BibRef

Perez-Gonzalez, F., Balado, F.,
Quantized projection data hiding,
ICIP02(II: 889-892).
IEEE DOI Link 0210
BibRef

Farid, H.,
Detecting hidden messages using higher-order statistical models,
ICIP02(II: 905-908).
IEEE DOI Link 0210
BibRef

Lin, C.Y., Chang, S.F.,
Zero-error Information Hiding Capacity of Digital Images,
ICIP01(III: 1007-1010).
IEEE DOI Link 0108
BibRef

Silvestre, G.,
Embedding Data in Digital Images Using CDMA Techniques,
ICIP00(Vol I: 589-592).
IEEE DOI Link 0008
BibRef

Masry, M.A., Ramos, M., Hemami, S.S.,
Robust Data Hiding Using Psychovisual Thresholding,
ICIP00(Vol I: 593-596).
IEEE DOI Link 0008
BibRef

Ding, W.[Wei], Yan, W.Q.[Wei-Qi], Qi, D.X.[Dong-Xu],
A Novel Digital Image Hiding Technology Based on Tangram and Conway's Game,
ICIP00(Vol I: 601-604).
IEEE DOI Link 0008
BibRef

Abdulaziz, N., Pang, K.,
Performance Evaluation of Data Hiding System Using Wavelet Transform and Error-control Coding,
ICIP00(Vol I: 605-608).
IEEE DOI Link 0008
BibRef

Alturki, F.T.[Faisal T.], Mersereauu, R.M.[Russell M.],
Secure Blind Image Steganographic Technique Using Discrete Fourier Transformation,
ICIP01(II: 542-545).
IEEE DOI Link 0108
BibRef

Sehgal, A., Jagmohan, A., Ahuja, N.,
High Capacity Data Embedding in the Wavelet Domain,
ICIP01(III: 979-982).
IEEE DOI Link 0108
BibRef

Ramkumar, M.[Mahalingam], Akansu, A.N.[Ali N.], Alatan, A.A.[A. Aydin],
A Robust Data Hiding Scheme for Images Using DFT,
ICIP99(II:211-215).
IEEE DOI Link BibRef 9900

Chotikakamthorn, N.[Nopporn],
Document Image Data hiding Technique Using Character Spacing Width Sequence Coding,
ICIP99(II:250-254).
IEEE DOI Link BibRef 9900

Fleet, D.J., and Heeger, D.,
Embedding Invisible Information in Color Images,
ICIP97(I: 532-535).
IEEE DOI Link
Postscript Version. BibRef 9700

Hsu, C.T.[Chiou-Ting], Wu, J.L.[Ja-Ling],
Hidden signatures in images,
ICIP96(III: 223-226).
IEEE DOI Link 9610
BibRef

Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Data Hiding, Steganography, LSB, Least Significant Bit .


Last update:Aug 30, 2014 at 15:34:18