Biomedical Engineering Reference
In-Depth Information
11. Aveibas I, Memon N, Sankur B (2001) Steganalysis based on image quality metrics. In: IEEE
fourth workshop on multimedia signal processing, pp 517-522
12. Wang RZ, Lin CF, Lin JC (2000) Hiding data in images by optimal moderately significant-bit
replacement. IEE Electronics Letter 36:2069-2070
13. Chan CK, Cheng LM (2001) Improved hiding data in images by optimal moderately
significant-bit replacement. IEE Electronics Letter 37:1017-1018
14. Chen B, Wornell GW (2001) Implementations of quantization index modulation methods for
digital watermarking and information embedding of multimedia. Special Issue Multimedia
Signal Processing 27:7-33
15. Voloshynovskiy S, Herrigel A, Rytsar Y (2002) StegoWall: blind statistical detection of
hidden data. Proceedings SPIE 4675:57-68
16. Rumelhart D, McClelland J (1986) Parallel distributed processing: explorations in the
microstructure of cognition, vol 1: Foundations. MIT Press Cambridge, MA
17. Bender W, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3/4):313-
336
18. Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern
Recogn 37(3):469-474
19. Chang CC, Hsiaob JY, Chan CS (2003) Finding optimal least-significant-bit substitution in
image hiding by dynamic programming strategy. Pattern Recognit 36:1583-1595
20. Johnson NF, Jajodia S (1998) Steganalysis of images created using current steganography
software. Lecture notes in computer science, vol 1525. Springer-Verlag, Berlin, pp 273-289
21. Fridrich J, Goljan M, Du R (2001) Steganalysis based on JPEG compatibility, SPIE
multimedia systems and applications IV, 20-24 Aug 2001
22. Kahn D (1996) The history of steganography. In: Proceedings of the first international
workshop on information hiding. Springer-Verlag, London, pp 1-5
23. Kelley J (2001) Terror groups hide behind Webencryption. USA Today, Feburary 2001.
http://www.usatoday.com/life/cyber/tech/2001-02-05-binladen.htm
24. Johnson NF, Jajodia S (1998) Steganalysis: ''the investigation of hidden information''.
Proceedings of the IEEE Information Technology Conference, Syracuse, New York, USA
25. Marvel LM, Boncelet CG, Retter CT (1999) Spread spectrum image steganography. IEEE
Trans Image Process 8(8):1075-1083
26. Schneier B (1996) Applied cryptography second edition: protocols, algorithms, and source
code in C. Wiley,
27. Wang RZ, Lin CF, Lin JC (2000) Hiding data in images by optimal moderately significant-bit
replacement. IEE Electron Lett 36(25):2069-2070
28. Wang RZ, Lin CF, Lin JC (2001) Image hiding by optimal LSB substitution and genetic
algorithm. Pattern Recogn 34(3):671-683
29. Rosenblatt F (1958) The perceptron a probabilistic model for information storage and
organization. Brain Psych Rev 62:386-408
30. Chen TS, Chang CC, Hwang MS (1998) A virtual image cryptosystem based upon vector
quantization. IEEE Trans Image Process 7(10):1485-1488
31. Chung KL, Shen CH, Chang LC (2001) A novel SVD- and VQ-based image hiding scheme.
Pattern Recognit Lett 22(9):1051-1058
Search WWH ::




Custom Search