Surveys, Image Hiding, Data Hiding, Steganography

Chapter Contents (Back)
Survey, Steganography. Survey, Watermark. Watermark. Watermark, Survey.

Johnson, N.F.[Neil F.], Jajodia, S.[Sushil],
Exploring Steganography: Seeing the Unseen,
Computer(31), No. 2, February 1998, pp. 26-34. Survey, Steganography. Discussion of various available tools for hiding text (and other information) in images. BibRef 9802

Brown, A.,
S-Tools for Windows,
Online Book1998.
WWW Version. Steganography tools to download BibRef 9800

Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.,
Information hiding: A survey,
PIEEE(87), No. 7, July 1999, pp. 1062-1078.
IEEE DOI Link 9907
Survey, Steganography. BibRef

Pérez-González, F.[Fernando], Hernández, J.R.[Juan R.], Balado, F.[Félix],
Approaching the Capacity Limit in Image Watermarking: A Perspective on Coding Techniques for Data Hiding Applications,
SP(81), No. 6, June 2001, pp. 1215-1238.
HTML Version. 0106

Barni, M.[Mauro], Bartolini, F.[Franco], Fridrich, J.[Jessica],
Special Issue: Emerging Applications of Multimedia Data Hiding,
JASP(2002), No. 2, 2002, pp. 123-125. 0202

Moulin, P., Mihcak, M.K.,
A framework for evaluating the data-hiding capacity of image sources,
IP(11), No. 9, September 2002, pp. 1029-1042.
IEEE DOI Link 0210
Evaluation, Watermark. BibRef

Mihcak, M.K., Moulin, P.,
Information embedding codes matched to locally stationary gaussian image models,
ICIP02(II: 137-140).
IEEE DOI Link 0210

Moulin, P., Mihcak, M.K., Lin, G.I.,
An Information-theoretic Model for Image Watermarking and Data Hiding,
ICIP00(Vol III: 667-670).
IEEE DOI Link 0008

Martin, A., Sapiro, G., Seroussi, G.,
Is Image Steganography Natural?,
IP(14), No. 12, December 2005, pp. 2040-2050.
IEEE DOI Link 0512

Alturki, F.T.[Faisal T.], Almutairi, A.F.[Ali F.], Mersereauu, R.M.[Russell M.],
Analysis of blind data hiding using discrete cosine transform phase modulation,
SP:IC(22), No. 4, April 2007, pp. 347-362.
WWW Version. 0704
Data hiding; Blind digital watermarking; Data embedding capacity; Bit error rate BibRef

Ker, A.D.,
A Capacity Result for Batch Steganography,
SPLetters(14), No. 8, August 2007, pp. 525-528.
IEEE DOI Link 0709

Paulson, L.D.[Linda Dailey],
Steganography Development Offers Promise,
Computer(43), No. 6, June 2010, pp. 18-21.
IEEE DOI Link 1007

Böhme, R.[Rainer],
Advanced Statistical Steganalysis,
Springer2010, ISBN: 978-3-642-14312-0
WWW Version. Click to purchase this book 1010

Cimato, S.[Stelvio], Yang, C.N.[Ching-Nung], (Eds.)
Visual Cryptography and Secret Image Sharing,
CRC PressJuly 15, 2011 ISBN: 9781439837214
WWW Version. Click to purchase this book 1106

Cerkez, P.S.,
Do you see what I see?,
IEEE DOI Link 1408
Steganography. BibRef

Xu, X.[Xikai], Dong, J.[Jing], Wang, W.[Wei], Tan, T.N.[Tie-Niu],
Video steganalysis based on the constraints of motion vectors,
IEEE DOI Link 1402
Video steganalysis BibRef

Fridrich, J.[Jessica],
Modern Trends in Steganography and Steganalysis,
Springer DOI Link 1208
Keynote, overview talk. BibRef

Rajput, G.K., Agrawal, R.K.,
Evaluation of Feature Selection Measures for Steganalysis,
Springer DOI Link 0912

Dominguez-Conde, G.[Gabriel], Comesana, P.[Pedro], Perez-Gonzalez, F.[Fernando],
Perfomance analysis of the Fridrich-Goljan self-embedding authentication method,
IEEE DOI Link 0911

Ker, A.D.[Andrew D.],
Estimating the Information Theoretic Optimal Stego Noise,
Springer DOI Link 0908

Cox, I.J.[Ingemar J.],
Data Hiding and the Statistics of Images,
Springer DOI Link 0908
Overview paper. BibRef

Huang, F.J.[Fang-Jun], Shi, Y.Q.[Yun Q.], Huang, J.W.[Ji-Wu],
A study on security performance of YASS,
IEEE DOI Link 0810
Yet another steganograpic system. BibRef

Rocha, A.[Anderson], Goldenstein, S.K.[Siome K.], Scheirer, W.[Walter], Boult, T.E.[Terrance E.],
The Unseen Challenge data sets,
IEEE DOI Link 0806
Dataset, Steganalysis. BibRef

Lee, S.K.[Sang-Kwang], Lim, S.J.[Seong-Jae], Suh, Y.H.[Young-Ho], Ho, Y.S.[Yo-Sung],
Lossless Data Hiding for Medical Images with Patient Information,
ICIP07(III: 253-256).
IEEE DOI Link 0709

Westfeld, A.[Andreas],
Steganalysis in the Presence of Weak Cryptography and Encoding,
Springer DOI Link 0611

Lee, K.S.[Kwang-Soo], Westfeld, A.[Andreas], Lee, S.J.[Sang-Jin],
Category Attack for LSB Steganalysis of JPEG Images,
Springer DOI Link 0611

Ullerich, C.[Christian], Westfeld, A.[Andreas],
Weaknesses of MB2,
Springer DOI Link 0712

Chang, K.[Kisik], Deng, R.H.[Robert H.], Feng, B.[Bao], Lee, S.J.[Sang-Jin], Kim, H.[Hyungjun],
On Security Notions of Steganographic Systems,
WWW Version. 0505

Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Watermarks for Copyright, Ownership Protection, Authentication, Verification, Forgery .

Last update:Oct 15, 2014 at 21:10:33