

A Study on Digital Image Steganography and Watermarking
Abstract
Keywords
References
Li, B., Biswas, S., & Blasch,” An estimation approach to extract multimedia information in distributed steganographic images” in 2007 10th International Conference on.
K.B.Raja, C.R.Chowdary, Venugopal K R, and L.M.Patnaik, ”A Secure Image Steganography using LSB and Compression Techniques on Raw Images” Department of Computer Science and Engineering, Bangalore 2005 IEEE.
P.W. Chan, M.R. Lyu, R. Chin, ”Copyright Protection on the Web: A Hybrid Digital Video Watermarking Scheme,” Poster Proceedings 13th International World Wide Web Conference (WWW’2004), pp. 354-355, New York, May 17- 22, 2004.
Ki-Hyun Jung & Kee-Young Yoo, “Steganographic method based on interpolation and LSB substitution of digital images”, Springer Science+Business, Media New York 2014.
S. Liu, H. Yao, W. Gao, Y. Liu, “An image fragile watermarking scheme based on chaotic image pattern and pixel-pairs”, Applied Mathematics and Computation, 2007, pp. 869-882.
Ming-Shi Wang, Wei-Che Chen, “A majority-voting based water-marking scheme for colour image tamper detection and recovery”, Computer Standards & Interfaces, Vol. 29, Issue 5, July 2007, pp. 561-570
C. Rey, J. L. Dugelay, “A survey of watermarking algorithms for image authentication”, EURASIP Journal on Applied Signal Processing (JASP) 2002, pp. 613-621.
A.N. Netravali and B.G. Haskell, “Digital Pictures: Representation, Compression, and Standards (2nd Ed)”, Plenum Press, New York, NY (1995).
M. Rabbani and P.W. Jones, “Digital Image Compression Techniques”, Vol TT7, SPIE Optical Engineering Press, Bellvue, Washington (1991).
T Morkel, JHP Eloff and MS Olivier, "An Overview of Image Steganography," in Proceeding of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sand to South Africa, June/July 2005.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.