High Capacity Images Based Steganography
Abstract
Keywords
Full Text:
PDFReferences
N. Provos and P. Honeyman, “Hide and seek: An introduction to steganography,” IEEE Security and Privacy Mag., vol. 1, no. 3, 2003.
R. J. Anderson and F. A. P. Petitcolas, “On the limits of steganography,” IEEE J. Sel. Areas Commun., vol. 16, 1998.
S. A. M. Gilani, I.Kostopoulos, and A. N. Skodras, “Color image-adaptive watermarking,” in Proc. 14th Int. Conf. Digital Signal Processing, 2002, vol. 2.
H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, “Image steganographic scheme based on pixel-value differencing and LSB replacement methods,” IEE Proc. Vis., Image , Signal Process., vol. 152, no. 5, Oct. 2005.
I. J. Cox, J. Kilian, F. T. Leighton, and T. Sharnoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Process., vol. 6, 1997.
P. C. Su and C. C. J. Kuo, “Steganography in JPEG2000 compressed images,” IEEE Trans. Consum. Electron., vol. 49, no. 4, pp. 824–832, Apr. 2003.
J. Fridrich, M. Goljan, and R. Du, “Detecting LSB steganography in color and gray-scale images,” IEEE Multimedia Mag., Oct. –Nov. 2001.
S. W. Lyu and H. Farid, “Steganalysis using higher-order image statistics,”IEEE Trans. Inf., Forensics, Sec., vol. 1, no. 1, Jan. 2006.
C. Christopoulos, A. Skodras, and T. Ebrahimi, “The JPEG2000 still image coding system: An overview,” IEEE Trans. Consum. Electron., vol. 46, no. 4, Apr. 2000.
D. S. Taubman and M. W. Marcellin, “JPEG2000: Standard for interactive imaging,” Proc. IEEE, vol. 90, no. 8, Aug. 2002.
S. W. Lyu and H. Farid, “Steganalysis using higher-order image statistics,” IEEE Trans. Inf., Forensics, Sec., vol. 1, no. 1, pp. 111–119, Jan. 2006.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.