Xydeag, C.S.,
Kostic, B.,
Steele, R.,
Embedding Data into Pictures by Modulo Masking,
Commun(32), 1984, pp. 56-69.
BibRef
8400
Lee, I.S.[I-Shi],
Tsai, W.H.[Wen-Hsiang],
Data Hiding in Binary Images with Distortion-Minimizing Capabilities by
Optimal Block Pattern Coding and Dynamic Programming Techniques,
IEICE(E90-D), No. 8, August 2007, pp. 1142-1150.
DOI Link
0708
BibRef
Lee, I.S.[I-Shi],
Tsai, W.H.[Wen-Hsiang],
Data hiding in grayscale images by dynamic programming based on a human
visual model,
PR(42), No. 7, July 2009, pp. 1604-1611.
Elsevier DOI
0903
Data hiding; Grayscale image; Human visual system; Block pattern
encoding; Dynamic programming
BibRef
Lee, Y.K.[Yeuan-Kuen],
Chen, L.H.[Ling-Hwei],
High capacity image steganographic model,
VISP(147), No. 3, 2000, pp. 288.
0008
BibRef
Wang, R.Z.[Ran-Zan],
Chen, Y.S.[Yeh-Shun],
High-payload image steganography using two-way block matching,
SPLetters(13), No. 3, March 2006, pp. 161-164.
IEEE DOI
0604
BibRef
Wang, R.Z.[Ran-Zan],
Su, C.H.[Chin-Hui],
Secret image sharing with smaller shadow images,
PRL(27), No. 6, 15 April 2006, pp. 551-555.
Elsevier DOI Secret sharing; Image sharing; Shadow image; Data hiding
0604
BibRef
Lin, Y.Y.[Yung-Yi],
Wang, R.Z.[Ran-Zan],
Scalable Secret Image Sharing With Smaller Shadow Images,
SPLetters(17), No. 1, January 2010, pp. 245-248.
IEEE DOI
1001
BibRef
Wang, R.Z.[Ran-Zan],
Chien, Y.F.[Yin-Fang],
Lin, Y.Y.[Yung-Yi],
Scalable user-friendly image sharing,
JVCIR(21), No. 7, October 2010, pp. 751-761.
Elsevier DOI
1003
Image sharing; Secret sharing; Secret image sharing; User-friendly
shadow image; Progressive reconstruction; Scalable sharing; Visual
cryptography; Visual secret sharing
BibRef
Fridrich, J.[Jessica],
Goljan, M.[Miroslav],
Du, R.[Rui],
Lossless Data Embedding: New Paradigm in Digital Watermarking,
JASP(2002), No. 2, 2002, pp. 185-196.
0202
BibRef
Su, W.K.[Wen-Kang],
Ni, J.Q.[Jiang-Qun],
Hu, X.L.[Xiang-Lei],
Fridrich, J.[Jessica],
Image Steganography With Symmetric Embedding Using Gaussian Markov
Random Field Model,
CirSysVideo(31), No. 3, March 2021, pp. 1001-1015.
IEEE DOI
2103
Distortion, Markov random fields, Payloads, Random variables, Art,
Adaptation models, Integrated circuit modeling, Steganography,
minimal distortion embedding
BibRef
Tong, Y.C.[Yi-Chen],
Ni, J.Q.[Jiang-Qun],
Su, W.K.[Wen-Kang],
Image Steganography Using an Eight-element Neighborhood Gaussian Markov
Random Field Model,
IWDW19(247-255).
Springer DOI
2003
BibRef
Huang, J.W.[Ji-Wu],
Shi, Y.Q.[Yun Q.],
Reliable information bit hiding,
CirSysVideo(12), No. 10, October 2002, pp. 916-920.
IEEE Top Reference.
0212
BibRef
Lu, W.[Wei],
Li, R.P.[Rui-Peng],
Zeng, L.W.[Ling-Wen],
Chen, J.J.[Jun-Jia],
Huang, J.W.[Ji-Wu],
Shi, Y.Q.[Yun-Qing],
Binary Image Steganalysis Based on Histogram of Structuring Elements,
CirSysVideo(30), No. 9, September 2020, pp. 3081-3094.
IEEE DOI
2009
Markov processes, Histograms, Shape, Image edge detection,
Distortion, Gray-scale, Visualization, Binary images, steganalysis,
histogram
BibRef
Avcibas, I.[Ismail],
Memon, N.[Nasir],
Sankur, B.[Bülent],
Steganalysis using image quality metrics,
IP(12), No. 2, February 2003, pp. 221-229.
IEEE DOI
0304
BibRef
Kim, H.J.[Hyoung Joong],
Choi, Y.H.[Yong Hee],
A novel echo-hiding scheme with backward and forward kernels,
CirSysVideo(13), No. 8, August 2003, pp. 885-889.
IEEE Abstract.
0309
BibRef
Thien, C.C.[Chih-Ching],
Lin, J.C.[Ja-Chen],
A simple and high-hiding capacity method for hiding digit-by-digit data
in images based on modulus function,
PR(36), No. 12, December 2003, pp. 2875-2881.
Elsevier DOI
0310
BibRef
Thien, C.C.[Chih-Ching],
Lin, J.C.[Ja-Chen],
An image-sharing method with user-friendly shadow images,
CirSysVideo(13), No. 12, December 2003, pp. 1161-1169.
IEEE Abstract.
0402
BibRef
Jain, A.K.[Anil K.],
Uludag, U.[Umut],
Hiding Biometric Data,
PAMI(25), No. 11, November 2003, pp. 1494-1498.
IEEE Abstract.
0311
Biometrics. How to establish the authenticity of the biometric data
itself. Biometric data is not replaceable or secret.
Hide the data (eigen face coefficients or fingerprints) itself in images.
BibRef
Jain, A.K.,
Uludag, U.,
Hsu, R.L.[Rein-Lien],
Hiding a face in a fingerprint image,
ICPR02(III: 756-759).
IEEE DOI
0211
BibRef
Wang, Z.C.[Zi-Chi],
Lv, J.P.[Jin-Peng],
Wei, Q.D.[Qing-De],
Zhang, X.P.[Xin-Peng],
Distortion Function for Spatial Image Steganography Based on the
Polarity of Embedding Change,
IWDW16(487-493).
Springer DOI
1703
BibRef
Wu, M.Y.[Mei-Yi],
Ho, Y.K.[Yu-Kun],
Lee, J.H.[Jia-Hong],
An iterative method of palette-based image steganography,
PRL(25), No. 3, February 2004, pp. 301-309.
Elsevier DOI
0401
BibRef
Earlier:
A Method to Improve the Stego-Image Quality for Palette-Based Image
Steganography,
DW03(483-496).
Springer DOI
0405
BibRef
Ho, Y.K.[Yu-Kuen],
Wu, M.Y.[Mei-Yi],
Robust object-based watermarking scheme via shape self-similarity
segmentation,
PRL(25), No. 15, November 2004, pp. 1673-1680.
Elsevier DOI
0411
BibRef
Yang, C.N.[Ching-Nung],
New visual secret sharing schemes using probabilistic method,
PRL(25), No. 4, March 2004, pp. 481-494.
Elsevier DOI
0402
BibRef
Yang, C.N.[Ching-Nung],
Chen, T.S.[Tse-Shih],
Aspect ratio invariant visual secret sharing schemes with minimum pixel
expansion,
PRL(26), No. 2, 15 January 2005, pp. 193-206.
Elsevier DOI
0501
BibRef
And:
Extended Visual Secret Sharing Schemes with High-Quality Shadow Images
Using Gray Sub Pixels,
ICIAR05(1184-1191).
Springer DOI
0509
BibRef
Earlier:
New Aspect Ratio Invariant Visual Secret Sharing Schemes Using Square
Block-Wise Operation,
ICIAR05(1167-1174).
Springer DOI
0509
BibRef
Yang, C.N.[Ching-Nung],
Chen, T.S.[Tse-Shih],
Reduce shadow size in aspect ratio invariant visual secret sharing
schemes using a square block-wise operation,
PR(39), No. 7, July 2006, pp. 1300-1314.
Elsevier DOI
0606
BibRef
And:
Visual Secret Sharing Scheme: Improving the Contrast of a Recovered
Image Via Different Pixel Expansions,
ICIAR06(I: 468-479).
Springer DOI
0610
Visual secret sharing; Visual cryptography; Secret image sharing
BibRef
Bastug, A.,
Sankur, B.,
Improving the Payload of Watermarking Channels via LDPC Coding,
SPLetters(11), No. 2, February 2004, pp. 90-92.
IEEE Abstract.
0402
BibRef
Wu, Y.S.[Yu-Shan],
Thien, C.C.[Chih-Ching],
Lin, J.C.[Ja-Chen],
Sharing and hiding secret images with size constraint,
PR(37), No. 7, July 2004, pp. 1377-1385.
Elsevier DOI
0405
BibRef
Wang, Y.L.[Yu-Lin],
Pearmain, A.[Alan],
Blind image data hiding based on self reference,
PRL(25), No. 15, November 2004, pp. 1681-1689.
Elsevier DOI
0411
See also Blind MPEG-2 Video Watermarking Robust Against Geometric Attacks: A Set of Approaches in DCT Domain.
BibRef
Solanki, K.,
Jacobsen, N.,
Madhow, U.,
Manjunath, B.S.,
Chandrasekaran, S.,
Robust image-adaptive data hiding using erasure and error correction,
IP(13), No. 12, December 2004, pp. 1627-1639.
IEEE DOI
0412
BibRef
Sullivan, K.,
Solanki, K.,
Manjunath, B.S.,
Madhow, U.,
Chandrasekaran, S.,
Determining Achievable Rates for Secure, Zero Divergence, Steganography,
ICIP06(121-124).
IEEE DOI
0610
BibRef
And: A2, A1, A4, A3, A5:
Provably Secure Steganography: Achieving Zero K-L Divergence using
Statistical Restoration,
ICIP06(125-128).
IEEE DOI
0610
BibRef
Solanki, K.,
Dabeer, O.,
Manjunath, B.S.,
Madhow, U.,
Chandrasekaran, S.,
A joint source-channel coding scheme for image-in-image data hiding,
ICIP03(II: 743-746).
IEEE Abstract.
0312
BibRef
Brisbane, G.,
Safavi-Naini, R.,
Ogunbona, P.,
High-capacity steganography using a shared colour palette,
VISP(152), No. 6, December 2005, pp. 787-792.
DOI Link
0512
BibRef
Alghoniemy, M.,
Tewfik, A.H.,
Progressive Quantized Projection Approach to Data Hiding,
IP(15), No. 2, February 2006, pp. 459-472.
IEEE DOI
0602
See also Geometric Invariance in image watermarking.
BibRef
Lan, T.H.,
Tewfik, A.H.,
A Novel High-Capacity Data-Embedding System,
IP(15), No. 8, August 2006, pp. 2431-2440.
IEEE DOI
0606
BibRef
Wu, Y.T.,
Shih, F.Y.,
Genetic Algorithm Based Methodology for Breaking the Steganalytic
Systems,
SMC-B(36), No. 1, February 2006, pp. 24-31.
IEEE DOI
0602
See also Enhancement of image watermark retrieval based on genetic algorithms.
BibRef
Comesana, P.[Pedro],
Perez-Gonzalez, F.[Fernando],
The Impact of the Cropping Attack on Scalar STDM Data Hiding,
SPLetters(13), No. 6, June 2006, pp. 353-356.
IEEE DOI
0606
BibRef
Meinecke, F.C.[Frank C.],
Harmeling, S.[Stefan],
Müller, K.R.[Klaus-Robert],
Inlier-based ICA with an application to superimposed images,
IJIST(15), No. 1, 2005, pp. 48-55.
DOI Link
0507
BibRef
Meinecke, F.C.[Frank C.],
von Bunau, P.[Paul],
Kawanabe, M.[Motoaki],
Muller, K.R.[Klaus-R.],
Learning invariances with Stationary Subspace Analysis,
Subspace09(87-92).
IEEE DOI
0910
BibRef
Shie, S.C.[Shih-Chieh],
Jiang, J.H.[Ji-Han],
Chen, L.T.[Long-Tai],
Huang, Z.H.[Zeng-Hui],
Secret Image Transmission Scheme Using Secret Codebook,
IEICE(E93-D), No. 2, February 2010, pp. 399-402.
WWW Link.
1002
BibRef
Feng, J.B.[Jen-Bang],
Wu, H.C.[Hsien-Chu],
Tsai, C.S.[Chwei-Shyong],
Chang, Y.F.[Ya-Fen],
Chu, Y.P.[Yen-Ping],
Visual secret sharing for multiple secrets,
PR(41), No. 12, December 2008, pp. 3572-3581.
Elsevier DOI
0810
Visual cryptography; Visual secret sharing; Multiple secret sharing;
Visual pattern
BibRef
Zhang, X.P.[Xiao-Ping],
Li, K.[Kan],
Wang, X.F.[Xiao-Feng],
A Novel Look-Up Table Design Method for Data Hiding With Reduced
Distortion,
CirSysVideo(18), No. 6, June 2008, pp. 769-776.
IEEE DOI
0711
BibRef
Li, B.,
Fang, Y.,
Huang, J.,
Steganalysis of Multiple-Base Notational System Steganography,
SPLetters(15), No. 1, 2008, pp. 493-496.
IEEE DOI
0806
BibRef
Gang, L.T.[Li-Tao],
Akansu, A.N.[Ali N.],
Cover Noise Interference Suppression In Multimedia Data Hiding,
IJIG(5), No. 1, January 2005, pp. 191-207.
0501
BibRef
Sallee, P.[Phil],
Model-based Methods For Steganography And Steganalysis,
IJIG(5), No. 1, January 2005, pp. 167-189.
0501
BibRef
Chang, C.C.[Chin-Chen],
Hsieh, Y.P.[Yi-Pei],
Lin, C.H.[Chia-Hsuan],
Sharing secrets in stego images with authentication,
PR(41), No. 10, October 2008, pp. 3130-3137.
Elsevier DOI
0808
Steganography; Authentication; Secret image sharing; (k,n) Threshold
See also comment on Sharing secrets in stego images with authentication, A.
BibRef
Chang, C.C.[Chin-Chen],
Hsieh, Y.P.[Yi-Pei],
Authors reply 'Sharing secrets in stego images with authentication',
PR(42), No. 7, July 2009, pp. 1620-1621.
Elsevier DOI
0903
See also comment on Sharing secrets in stego images with authentication, A.
BibRef
Lin, J.[Juan],
Horng, J.H.[Ji-Hwei],
Liu, Y.J.[Yan-Jun],
Chang, C.C.[Chin-Chen],
An anisotropic reference matrix for image steganography,
JVCIR(74), 2021, pp. 102969.
Elsevier DOI
2101
Anisotropic reference matrix, Data hiding, Steganography,
Visual quality, Embedding capacity
BibRef
Lee, C.F.[Chin-Feng],
Chang, C.C.[Chin-Chen],
Wang, K.H.[Kuo-Hua],
An improvement of EMD embedding method for large payloads by pixel
segmentation strategy,
IVC(26), No. 12, 1 December 2008, pp. 1670-1676.
Elsevier DOI
0810
Covert communication; Digit steganography; Data hiding; Embedding capacity
EMD: Empirical mode decomposition
BibRef
Lee, C.F.[Chin-Feng],
Chen, H.L.[Hsing-Ling],
Lai, S.H.[Shu-Hua],
An adaptive data hiding scheme with high embedding capacity and visual
image quality based on SMVQ prediction through classification codebooks,
IVC(28), No. 8, August 2010, pp. 1293-1302.
Elsevier DOI
1006
Data hiding; Image quality of stego-image; Embedding capacity;
Side-match vector quantization; SMVQ prediction
BibRef
Yang, C.N.[Ching-Nung],
Ciou, C.B.[Chuei-Bang],
A comment on 'Sharing secrets in stego images with authentication',
PR(42), No. 7, July 2009, pp. 1615-1619.
Elsevier DOI
0903
Secret sharing; Image secret sharing; Steganography; Authentication
See also Sharing secrets in stego images with authentication.
BibRef
Yang, C.N.[Ching-Nung],
Ciou, C.B.[Chuei-Bang],
Image secret sharing method with two-decoding-options:
Lossless recovery and previewing capability,
IVC(28), No. 12, December 2010, pp. 1600-1610.
Elsevier DOI
1003
Image secret sharing; Visual cryptography; Polynomial-based secret
sharing; Lagrange interpolation
BibRef
Li, P.[Peng],
Ma, P.J.[Pei-Jun],
Su, X.H.[Xiao-Hong],
Yang, C.N.[Ching-Nung],
Improvements of a two-in-one image secret sharing scheme based on gray
mixing model,
JVCIR(23), No. 3, April 2012, pp. 441-453.
Elsevier DOI
1203
Image secret sharing; Visual cryptography; Polynomial-based secret
sharing; Gray mixing model; Information hiding; Lagrange
interpolation; (k,n)-threshold scheme; Image processing
BibRef
Li, P.[Peng],
Yang, C.N.[Ching-Nung],
Kong, Q.[Qian],
A Novel Two-in-One Image Secret Sharing Scheme Based on Perfect Black
Visual Cryptography,
RealTimeIP(14), No. 1, January 2018, pp. 41-50.
WWW Link.
1802
BibRef
Earlier:
Two-in-One Image Secret Sharing Scheme Based on Boolean Operations,
IWDW14(305-318).
Springer DOI
1602
BibRef
Liu, N.,
Amin, P.,
Subbalakshmi, K.P.,
Security and Robustness Enhancement for Image Data Hiding,
MultMed(9), No. 3, April 2007, pp. 466-474.
IEEE DOI
0905
BibRef
Amin, P.[Palak],
Subbalakshmi, K.P.,
Detecting Hidden Messages Using Image Power Spectrum,
ICIP07(I: 421-424).
IEEE DOI
0709
BibRef
Eslami, Z.,
Razzaghi, S.H.,
Ahmadabadi, J.Z.[J. Zarepour],
Secret image sharing based on cellular automata and steganography,
PR(43), No. 1, January 2010, pp. 397-404.
Elsevier DOI
0909
Secret sharing scheme; Linear memory cellular automata; Digital
signature; Authentication; Verifiability
BibRef
Sheidani, S.[Sorour],
Eslami, Z.[Ziba],
Blind multipurpose watermarking with insertion of a single watermark:
A generic construction based on verifiable threshold secret sharing,
IET-IPR(14), No. 17, 24 December 2020, pp. 4766-4773.
DOI Link
2104
BibRef
Cheng, Y.M.[Yu-Ming],
Wang, C.M.[Chung-Ming],
A Novel Approach to Steganography in High- Dynamic-Range Images,
MultMedMag(16), No. 3, July-September 2009, pp. 70-80.
IEEE DOI
0909
BibRef
Lin, Y.T.[Yun-Te],
Wang, C.M.[Chung-Ming],
Chen, W.S.[Wei-Sung],
Lin, F.P.[Fang-Pang],
Lin, W.[Woei],
A Novel Data Hiding Algorithm for High Dynamic Range Images,
MultMed(19), No. 1, January 2017, pp. 196-211.
IEEE DOI
1612
Distortion
BibRef
Zeng, X.T.[Xian-Ting],
Ping, L.D.[Ling-Di],
Pan, X.Z.[Xue-Zeng],
A lossless robust data hiding scheme,
PR(43), No. 4, April 2010, pp. 1656-1667.
Elsevier DOI
1002
Lossless data hiding; Watermarking; Steganography; Image processing;
Robust lossless data hiding; Semi-fragile authentication
BibRef
Kalantari, N.K.,
Ahadi, S.M.,
A Logarithmic Quantization Index Modulation for Perceptually Better
Data Hiding,
IP(19), No. 6, June 2010, pp. 1504-1517.
IEEE DOI
1006
BibRef
Lin, G.S.[Guo-Shiang],
Chang, Y.T.,
Lie, W.N.[Won-Nuiig],
A Framework of Enhancing Image Steganography With Picture Quality
Optimization and Anti-Steganalysis Based on Simulated Annealing
Algorithm,
MultMed(12), No. 5, 2010, pp. 345-357.
IEEE DOI
1008
BibRef
Chuang, C.H.[Cheng-Hung],
Lin, G.S.[Guo-Shiang],
An Optical Video Cryptosystem with Adaptive Steganography,
MVA09(439-).
PDF File.
0905
BibRef
Hou, C.L.,
Lu, C.,
Tsai, S.C.,
Tzeng, W.G.,
An Optimal Data Hiding Scheme With Tree-Based Parity Check,
IP(20), No. 3, March 2011, pp. 880-886.
IEEE DOI
1103
BibRef
Gao, X.,
An, L.,
Yuan, Y.,
Tao, D.,
Li, X.,
Lossless Data Embedding Using Generalized Statistical Quantity
Histogram,
CirSysVideo(21), No. 8, August 2011, pp. 1061-1070.
IEEE DOI
1108
BibRef
Guo, C.[Cheng],
Chang, C.C.[Chin-Chen],
Qin, C.[Chuan],
A hierarchical threshold secret image sharing,
PRL(33), No. 1, 1 January 2012, pp. 83-91.
Elsevier DOI
1112
Hierarchical threshold; Distortion-free; Secret image sharing; Access structure
BibRef
Guo, C.[Cheng],
Chang, C.C.[Chin-Chen],
Qin, C.[Chuan],
A multi-threshold secret image sharing scheme based on MSP,
PRL(33), No. 12, 1 September 2012, pp. 1594-1600.
Elsevier DOI
1208
Multi-threshold secret sharing; Access structure; Secret image sharing;
Monotone span programs
BibRef
Li, F.Y.[Feng-Yong],
Sheng, Y.[Yang],
Zhang, X.P.[Xin-Peng],
Qin, C.[Chuan],
iSCMIS:Spatial-Channel Attention Based Deep Invertible Network for
Multi-Image Steganography,
MultMed(26), 2024, pp. 3137-3152.
IEEE DOI
2402
Steganography, Distortion, Neural networks, Couplings, Security,
Visualization, Additives, Attention mechanism, high-capacity,
visual quality
BibRef
Yu, J.[Jiang],
Li, F.Y.[Feng-Yong],
Wang, Z.C.[Zi-Chi],
Si, W.[Wen],
Zhang, X.P.[Xin-Peng],
Diverse Batch Steganography Using Model-Based Selection and
Double-Layered Payload Assignment,
CirSysVideo(34), No. 8, August 2024, pp. 7785-7800.
IEEE DOI
2408
Distortion, Payloads, Steganography, Security, Resource management,
Integrated circuit modeling, Gaussian distribution,
Kullback-Leibler (KL) divergence
BibRef
Yang, C.N.[Ching-Nung],
Wu, C.C.[Chih-Cheng],
Lin, Y.C.[Yi-Chin],
Kim, C.[Cheonshik],
Enhanced Matrix-Based Secret Image Sharing Scheme,
SPLetters(19), No. 12, December 2012, pp. 789-792.
IEEE DOI
1212
BibRef
Varsaki, E.E.[Eleni E.],
Fotopoulos, V.[Vassilis],
Skodras, A.N.[Athanassios N.],
Data hiding based on image texture classification,
SIViP(7), No. 2, March 2013, pp. 247-253.
WWW Link.
1303
BibRef
Elshoura, S.M.,
Megherbi, D.B.,
A secure high capacity full-gray-scale-level multi-image information
hiding and secret image authentication scheme via Tchebichef moments,
SP:IC(28), No. 5, May 2013, pp. 531-552.
Elsevier DOI
1305
Information hiding; Image processing; Steganography; Multi-media
computing; Secret communication; Image watermarking; Secret information
content verification and authentication; Tchebichef moments
BibRef
Elshoura, S.M.,
Megherbi, D.B.,
Analysis of noise sensitivity of Tchebichef and Zernike moments with
application to image watermarking,
JVCIR(24), No. 5, July 2013, pp. 567-578.
Elsevier DOI
1306
Sensitivity; Noise sensitivity; Tchebichef moments; Zernike
moments; Image watermarking; Tampering detection; Image reconstruction;
Error measurement
BibRef
Li, P.[Peng],
Ma, J.F.[Jian-Feng],
Ma, Q.[Quan],
(t, k, n) XOR-based visual cryptography scheme with essential shadows,
JVCIR(72), 2020, pp. 102911.
Elsevier DOI
2010
XOR operation, Essential participants, Visual cryptography, Secret image sharing
BibRef
Li, P.[Peng],
Yang, C.N.[Ching-Nung],
Wu, C.C.[Chih-Cheng],
Kong, Q.[Qian],
Ma, Y.P.[Yan-Peng],
Essential secret image sharing scheme with different importance of
shadows,
JVCIR(24), No. 7, 2013, pp. 1106-1114.
Elsevier DOI
1309
Secret sharing
BibRef
Li, P.[Peng],
Liu, Z.Q.[Zu-Quan],
Yang, C.N.[Ching-Nung],
A construction method of (t,k,n)-essential secret image sharing
scheme,
SP:IC(65), 2018, pp. 210-220.
Elsevier DOI
1805
BibRef
Earlier: A1, A2, Only:
A Novel Visual Cryptography Scheme with Different Importance of Shadows,
IWDW17(365-377).
Springer DOI
1708
Secret image sharing, Secret sharing, Essential shadows,
Lagrange interpolation.
BibRef
Li, P.[Peng],
Yin, L.P.[Li-Ping],
Ma, J.F.[Jian-Feng],
Wang, H.T.[Hong-Tao],
XOR-based visual cryptography scheme with essential shadows,
JVCIR(85), 2022, pp. 103513.
Elsevier DOI
2205
XOR operation, Essential shadows, Visual cryptography,
Secret image sharing, Shadow image, Access structure partition
BibRef
Liu, Y.X.[Yan-Xiao],
Yang, C.N.[Ching-Nung],
Scalable secret image sharing scheme with essential shadows,
SP:IC(58), No. 1, 2017, pp. 49-55.
Elsevier DOI
1710
Secret image sharing
BibRef
Liu, Y.X.[Yan-Xiao],
Yang, C.N.[Ching-Nung],
Chou, Y.S.[Yung-Shun],
Wu, S.Y.[Song-Yu],
Sun, Q.D.[Qin-Dong],
Progressive (k,n) secret image sharing Scheme with meaningful shadow
images by GEMD and RGEMD,
JVCIR(55), 2018, pp. 766-777.
Elsevier DOI
1809
Progressive secret sharing scheme, Meaningful shadow image,
GEMD, RGEMD
BibRef
Yang, C.N.[Ching-Nung],
Li, P.[Peng],
Wu, C.C.[Chih-Cheng],
Cai, S.R.[Song-Ruei],
Reducing shadow size in essential secret image sharing by conjunctive
hierarchical approach,
SP:IC(31), No. 1, 2015, pp. 1-9.
Elsevier DOI
1502
Secret sharing
BibRef
Mohd, B.J.[Bassam Jamil],
Abed, S.[Sa'ed],
Na'ami, B.[Bassam],
Hayajneh, T.[Thaier],
Hierarchical steganography using novel optimum quantization technique,
SIViP(7), No. 6, November 2013, pp. 1029-1040.
Springer DOI
1310
BibRef
Liu, L.[Li],
Wang, A.H.[An-Hong],
Chang, C.C.[Chin-Chen],
Li, Z.H.[Zhi-Hong],
A novel real-time and progressive secret image sharing with flexible
shadows based on compressive sensing,
SP:IC(29), No. 1, 2014, pp. 128-134.
Elsevier DOI
1402
Compressed sensing
BibRef
Nilizadeh, A.,
Mazurczyk, W.,
Zou, C.,
Leavens, G.T.,
Information Hiding in RGB Images Using an Improved Matrix Pattern
Approach,
PRIV17(1407-1415)
IEEE DOI
1709
Computer science, Frequency-domain analysis,
Keyboards, Media, Receivers, Security
BibRef
Hou, X.D.[Xiao-Dan],
Zhang, T.[Tao],
Xiong, G.[Gang],
Lu, Z.B.[Zhi-Bo],
Xie, K.[Kai],
A novel steganalysis framework of heterogeneous images based on GMM
clustering,
SP:IC(29), No. 3, 2014, pp. 385-399.
Elsevier DOI
1403
Steganalysis
BibRef
Lee, Y.W.[Young-Woon],
Heo, J.P.[Jae-Pil],
Yoon, S.E.[Sung-Eui],
Quadra-Embedding: Binary Code Embedding with Low Quantization Error,
CVIU(125), No. 1, 2014, pp. 214-222.
Elsevier DOI
1406
BibRef
Earlier:
ACCV12(II:214-227).
Springer DOI
1304
Large-scale image retrieval
BibRef
Heo, J.P.[Jae-Pil],
Lin, Z.[Zhe],
Yoon, S.E.[Sung-Eui],
Distance Encoded Product Quantization,
CVPR14(2139-2146)
IEEE DOI
1409
Large-scale search; binary code; image retrieval
BibRef
Pakniat, N.[Nasrollah],
Noroozi, M.[Mahnaz],
Eslami, Z.[Ziba],
Secret image sharing scheme with hierarchical threshold access
structure,
JVCIR(25), No. 5, 2014, pp. 1093-1101.
Elsevier DOI
1406
Cryptography
BibRef
Li, L.X.[Ling-Xiang],
Chen, Z.[Zhi],
Fang, J.[Jun],
On Secrecy Capacity of Gaussian Wiretap Channel Aided by A
Cooperative Jammer,
SPLetters(21), No. 11, November 2014, pp. 1356-1360.
IEEE DOI
1408
Gaussian channels
BibRef
Lin, P.Y.[Pei-Yu],
Hsieh, W.F.[Wei-Fan],
Media pattern exhibition mechanism via mobile devices,
JVCIR(25), No. 8, 2014, pp. 1856-1864.
Elsevier DOI
1411
Histogram.
conceal pattern.
BibRef
Tseng, H.W.[Hsien-Wen],
Leng, H.S.[Hui-Shih],
High-payload block-based data hiding scheme using hybrid edge
detector with minimal distortion,
IET-IPR(8), No. 11, 2014, pp. 647-654.
DOI Link
1412
data encapsulation
BibRef
Feng, B.W.[Bing-Wen],
Lu, W.[Wei],
Sun, W.[Wei],
Binary image steganalysis based on pixel mesh Markov transition
matrix,
JVCIR(26), No. 1, 2015, pp. 284-295.
Elsevier DOI
1502
Binary image
BibRef
Lu, W.[Wei],
He, L.Y.[Li-Yu],
Yeung, Y.L.[Yui-Leong],
Xue, Y.J.[Ying-Jie],
Liu, H.M.[Hong-Mei],
Feng, B.W.[Bing-Wen],
Secure Binary Image Steganography Based on Fused Distortion
Measurement,
CirSysVideo(29), No. 6, June 2019, pp. 1608-1618.
IEEE DOI
1906
Distortion, Distortion measurement, Visualization, Security,
Frequency division multiplexing, Image quality,
flipping position optimization
BibRef
Dixit, P.[Pushkar],
Singh, N.[Nishant],
Gupta, J.P.[Jay Prakash],
Agrawal, D.D.[Dev Drume],
Kumar, V.[Vinay],
A robust semi fragile lossless image data hiding approach,
IJCVR(5), No. 1, 2015, pp. 1-22.
DOI Link
1502
BibRef
Zhang, J.H.[Jun-Hong],
Lu, W.[Wei],
Yin, X.L.[Xiao-Lin],
Liu, W.T.[Wan-Teng],
Yeung, Y.L.[Yui-Leong],
Binary image steganography based on joint distortion measurement,
JVCIR(58), 2019, pp. 600-605.
Elsevier DOI
1901
Binary image steganography, Distortion measurement, Local texture pattern
BibRef
Liu, W.T.[Wan-Teng],
Yin, X.L.[Xiao-Lin],
Lu, W.[Wei],
Zhang, J.H.[Jun-Hong],
Halftone Image Steganography with Distortion Measurement Based on
Structural Similarity,
IWDW19(281-292).
Springer DOI
2003
BibRef
Yeung, Y.L.[Yui-Leong],
Lu, W.[Wei],
Xue, Y.J.[Ying-Jie],
Huang, J.[Jiwu],
Shi, Y.Q.[Yun-Qing],
Secure Binary Image Steganography With Distortion Measurement Based
on Prediction,
CirSysVideo(30), No. 5, May 2020, pp. 1423-1434.
IEEE DOI
2005
Distortion, Distortion measurement, Uncertainty, Predictive models,
Visual perception, Media, Binary image steganography,
syndrome-trellis code (STC)
BibRef
Yan, X.[Xuehu],
Wang, S.[Shen],
El-Latif, A.A.A.[Ahmed A. Abd],
Niu, X.[Xiamu],
New approaches for efficient information hiding-based secret image
sharing schemes,
SIViP(9), No. 3, March 2015, pp. 499-510.
Springer DOI
1503
BibRef
Yan, X.[Xuehu],
Lu, Y.L.[Yu-Liang],
Liu, L.T.[Lin-Tao],
Wang, S.[Shen],
Partial secret image sharing for (k,n) threshold based on image
inpainting,
JVCIR(50), 2018, pp. 135-144.
Elsevier DOI
1802
Secret image sharing, Partial secret image sharing,
Image inpainting, Linear congruence, Color image, Lossless recovery
BibRef
Liu, L.T.[Lin-Tao],
Lu, Y.L.[Yu-Liang],
Yan, X.[Xuehu],
A novel (k1,k2,n)-threshold two-in-one secret image sharing scheme
for multiple secrets,
JVCIR(74), 2021, pp. 102971.
Elsevier DOI
2101
Ideal secret sharing, RGVCS, Polynomial-based SISS, TiOSISS,
Multiple secrets, threshold
BibRef
Ou, D.H.[Duan-Hao],
Ye, L.[Lili],
Sun, W.[Wei],
User-friendly secret image sharing scheme with verification ability
based on block truncation coding and error diffusion,
JVCIR(29), No. 1, 2015, pp. 46-60.
Elsevier DOI
1504
Secret image sharing
BibRef
Yin, Z.X.[Zhao-Xia],
Chang, C.C.[Chin-Chen],
Xu, Q.[Qin],
Luo, B.[Bin],
Second-order steganographic method based on adaptive reference matrix,
IET-IPR(9), No. 4, 2015, pp. 300-305.
DOI Link
1505
image matching
BibRef
Mao, Q.,
Bharanitharan, K.,
Chang, C.,
Multi-round dynamic swap optimisation for table-based steganography,
IET-IPR(9), No. 12, 2015, pp. 1073-1082.
DOI Link
1512
cryptography
BibRef
Akhavan, S.[Saeed],
Akhaee, M.A.[Mohammad Ali],
Sarreshtedari, S.[Saeed],
Images steganalysis using GARCH model for feature selection,
SP:IC(39, Part A), No. 1, 2015, pp. 75-83.
Elsevier DOI
1512
Steganalysis
BibRef
Hou, Y.C.[Young-Chang],
Quan, Z.Y.[Zen-Yu],
Tsai, C.F.[Chih-Fong],
A privilege-based visual secret sharing model,
JVCIR(33), No. 1, 2015, pp. 358-367.
Elsevier DOI
1512
Visual secret sharing
BibRef
Tang, W.X.[Wei-Xuan],
Li, B.[Bin],
Luo, W.Q.[Wei-Qi],
Huang, J.W.[Ji-Wu],
Clustering Steganographic Modification Directions for Color
Components,
SPLetters(23), No. 2, February 2016, pp. 197-201.
IEEE DOI
1602
image color analysis.
Color causes issues vs. gray-scale.
BibRef
Srividhya, S.,
Sathishkumar, R.,
Sudha, G.F.[Gnanou Florence],
Implementation of TiOISSS with meaningful shadows and with an
additional authentication image,
JVCIR(38), No. 1, 2016, pp. 284-296.
Elsevier DOI
1605
Two in One Image Secret Sharing Scheme.
Visual cryptography
BibRef
Sridhar, S.[Srividhya],
Sudha, G.F.[Gnanou Florence],
Two in One Image Secret Sharing Scheme (TiOISSS) for extended
progressive visual cryptography using simple modular arithmetic
operations,
JVCIR(74), 2021, pp. 102996.
Elsevier DOI
2101
Visual Cryptography, Progressive, Polynomial,
Meaningful shares and Modular Arithmetic
BibRef
Yu, J.,
Li, F.,
Cheng, H.,
Zhang, X.,
Spatial Steganalysis Using Contrast of Residuals,
SPLetters(23), No. 7, July 2016, pp. 989-992.
IEEE DOI
1608
feature extraction
BibRef
Kamal, A.H.M.,
Islam, M.M.[Mohammad Mahfuzul],
Boosting up the data hiding rate through multi cycle embedment
process,
JVCIR(40, Part B), No. 1, 2016, pp. 574-588.
Elsevier DOI
1610
Data hiding
BibRef
Hou, X.D.[Xiao-Dan],
Zhang, T.[Tao],
Xu, C.[Chen],
New framework for unsupervised universal steganalysis via SRISP-aided
outlier detection,
SP:IC(47), No. 1, 2016, pp. 72-85.
Elsevier DOI
1610
Steganalysis
BibRef
Meghrajani, Y.K.,
Mazumdar, H.S.,
Universal Share for Multisecret Image Sharing Scheme Based on Boolean
Operation,
SPLetters(23), No. 10, October 2016, pp. 1429-1433.
IEEE DOI
1610
Boolean algebra
BibRef
Kazemi, R.,
Perez-Gonzalez, F.,
Akhaee, M.A.,
Behnia, F.,
Data Hiding Robust to Mobile Communication Vocoders,
MultMed(18), No. 12, December 2016, pp. 2345-2357.
IEEE DOI
1612
Codecs
See also Robust image watermarking using dihedral angle based on maximum-likelihood detector.
BibRef
Mohammadi, F.G.[F. Ghareh],
Sajedi, H.,
Region based Image Steganalysis using Artificial Bee Colony,
JVCIR(44), No. 1, 2017, pp. 214-226.
Elsevier DOI
1703
Image steganalysis
BibRef
Cao, B.[Bing],
Feng, G.R.[Guo-Rui],
Yin, Z.X.[Zhao-Xia],
Fan, L.Y.[Ling-Yan],
Unsupervised Image Steganalysis Method Using Self-Learning Ensemble
Discriminant Clustering,
IEICE(E100-D), No. 5, May 2017, pp. 1144-1147.
WWW Link.
1705
BibRef
Feng, B.W.[Bing-Wen],
Weng, J.[Jian],
Lu, W.[Wei],
Pei, B.[Bei],
Steganalysis of content-adaptive binary image data hiding,
JVCIR(46), No. 1, 2017, pp. 119-127.
Elsevier DOI
1706
Binary, image
BibRef
Yang, T.Y.[Ting-Ya],
Chen, H.S.[Hou-Shou],
Matrix embedding in steganography with binary Reed-Muller codes,
IET-IPR(11), No. 7, July 2017, pp. 522-529.
DOI Link
1707
BibRef
Liao, X.[Xin],
Qin, Z.[Zheng],
Ding, L.P.[Li-Ping],
Data embedding in digital images using critical functions,
SP:IC(58), No. 1, 2017, pp. 146-156.
Elsevier DOI
1710
Image steganography
BibRef
Yang, J.X.[Jun-Xue],
Liao, X.[Xin],
An embedding strategy on fusing multiple image features for data
hiding in multiple images,
JVCIR(71), 2020, pp. 102822.
Elsevier DOI
2009
Multiple images steganography, Embedding strategy,
Multiple image features, Image complexity, Steganographic capacity
BibRef
Liao, X.[Xin],
Yu, Y.B.[Ying-Bo],
Li, B.[Bin],
Li, Z.P.[Zhong-Peng],
Qin, Z.[Zheng],
A New Payload Partition Strategy in Color Image Steganography,
CirSysVideo(30), No. 3, March 2020, pp. 685-696.
IEEE DOI
2003
Color, Payloads, Distortion, Image color analysis, Security,
Correlation, Gray-scale, Image steganography, RGB channels,
modification probabilities
BibRef
Bhattacharjee, T.[Tapasi],
Maity, S.P.[Santi P.],
Islam, S.R.[Sheikh Rafiul],
Hierarchical secret image sharing scheme in compressed sensing,
SP:IC(61), No. 1, 2018, pp. 21-32.
Elsevier DOI
1801
Secret image sharing
BibRef
Wan, S.[Song],
Lu, Y.L.[Yu-Liang],
Yan, X.H.[Xue-Hu],
Wang, Y.J.[Yong-Jie],
Chang, C.[Chao],
Visual secret sharing scheme for (k, n) threshold based on QR code with
multiple decryptions,
RealTimeIP(14), No. 1, January 2018, pp. 25-40.
Springer DOI
1802
BibRef
Chen, J.[Jia],
Wang, Y.J.[Yong-Jie],
Yan, X.[Xuehu], baaa
Wang, J.[Jiayu],
Li, L.L.[Long-Long],
Visual secret sharing scheme with (n,n) threshold based on WeChat
Mini Program codes,
JVCIR(82), 2022, pp. 103409.
Elsevier DOI
2201
Visual secret sharing, WeChat Mini Program codes,
Error correction, Access control
BibRef
Xia, C.[Chao],
Guan, Q.X.[Qing-Xiao],
Zhao, X.F.[Xian-Feng],
Zhao, C.D.[Cheng-Duo],
Highly accurate real-time image steganalysis based on GPU,
RealTimeIP(14), No. 1, January 2018, pp. 223-236.
Springer DOI
1802
BibRef
Liu, X.[Xin],
Wang, S.[Shen],
Sang, J.Z.[Jian-Zhi],
Zhang, W.Z.[Wei-Zhe],
A novel mapping-based lossless recovery algorithm for VSS,
RealTimeIP(14), No. 1, January 2018, pp. 51-60.
Springer DOI
1802
Visual Secret Sharing (VSS).
BibRef
Atta, R.[Randa],
Ghanbari, M.[Mohammad],
A high payload steganography mechanism based on wavelet packet
transformation and neutrosophic set,
JVCIR(53), 2018, pp. 42-54.
Elsevier DOI
1805
Image steganography, Wavelet packet transformation,
Neutrosophic set, Edge detection
BibRef
Sharma, V.K.[Vijay Kumar],
Srivastava, D.K.[Devesh Kumar],
Mathur, P.[Pratistha],
Efficient image steganography using graph signal processing,
IET-IPR(12), No. 6, June 2018, pp. 1065-1071.
DOI Link
1805
BibRef
Wu, X.T.[Xiao-Tian],
Yang, C.N.[Ching-Nung],
Zhuang, Y.T.[Yi Ting],
Hsu, S.C.[Shen-Chieh],
Improving recovered image quality in secret image sharing by simple
modular arithmetic,
SP:IC(66), 2018, pp. 42-49.
Elsevier DOI
1806
Secret image sharing, Visual quality, Polynomial, Modular,
Finite field, Distortion
BibRef
Yang, C.N.[Ching-Nung],
Wu, X.T.[Xiao-Tian],
Chung, M.J.[Min-Jung],
Zhang, X.L.[Xu-Liang],
AMBTC-based secret image sharing by simple modular arithmetic,
JVCIR(84), 2022, pp. 103482.
Elsevier DOI
2204
Secret image sharing, Secret sharing,
Simple modular arithmetic, AMBTC, Distortion-free
BibRef
Liu, Y.X.[Yan-Xiao],
Yang, C.N.[Ching-Nung],
Wu, S.Y.[Song-Yu],
Chou, Y.S.[Yung-Shun],
Progressive (k,n) secret image sharing schemes based on Boolean
operations and covering codes,
SP:IC(66), 2018, pp. 77-86.
Elsevier DOI
1806
Progressive secret image sharing, Boolean operation,
Hamming code, Covering function
BibRef
Chen, J.L.[Jia-Liang],
Lu, W.[Wei],
Fang, Y.M.[Yan-Mei],
Liu, X.J.[Xian-Jin],
Yeung, Y.L.[Yui-Leong],
Xue, Y.J.[Ying-Jie],
Binary image steganalysis based on local texture pattern,
JVCIR(55), 2018, pp. 149-156.
Elsevier DOI
1809
Binary image steganalysis, Local texture pattern,
Manhattan distance, Ensemble classifier
BibRef
Hu, D.H.[Dong-Hui],
Xu, H.Y.[Hai-Yan],
Ma, Z.J.[Zhong-Jin],
Zheng, S.L.[Shu-Li],
Li, B.[Bin],
A Spatial Image Steganography Method Based on Nonnegative Matrix
Factorization,
SPLetters(25), No. 9, September 2018, pp. 1364-1368.
IEEE DOI
1809
image coding, matrix decomposition, steganography,
spatial image steganography method,
pixelwise mutual prediction
BibRef
Ge, H.[Hui],
Hu, D.H.[Dong-Hui],
Xu, H.Y.[Hai-Yan],
Li, M.[Meng],
Zheng, S.L.[Shu-Li],
New Steganalytic Features for Spatial Image Steganography Based on
Non-negative Matrix Factorization,
IWDW19(337-351).
Springer DOI
2003
BibRef
Wang, Z.,
Zhang, X.,
Yin, Z.,
Joint Cover-Selection and Payload-Allocation by Steganographic
Distortion Optimization,
SPLetters(25), No. 10, October 2018, pp. 1530-1534.
IEEE DOI
1810
Distortion, Payloads, Optimization, Mathematical model,
Optical fibers, Security, Communication channels, Cover-selection,
steganography
BibRef
Kanso, A.,
Ghebleh, M.,
An efficient lossless secret sharing scheme for medical images,
JVCIR(56), 2018, pp. 245-255.
Elsevier DOI
1811
Secret sharing, Secret image sharing, -threshold scheme, Chaos
BibRef
Kabirirad, S.[Saeideh],
Eslami, Z.[Ziba],
A (t,n)-multi secret image sharing scheme based on Boolean operations,
JVCIR(57), 2018, pp. 39-47.
Elsevier DOI
1812
-secret image sharing scheme, Multi-secret image sharing,
Boolean operations, Security
BibRef
Yan, X.[Xuehu],
Lu, Y.L.[Yu-Liang],
Liu, L.[Lintao],
A general progressive secret image sharing construction method,
SP:IC(71), 2019, pp. 66-75.
Elsevier DOI
1901
Secret image sharing, Progressive secret image sharing,
Polynomial-based secret image sharing, Visual cryptography, Linear congruence
BibRef
Huang, C.T.[Cheng-Ta],
Lin, L.C.[Li-Chiun],
Yang, C.H.[Cheng-Hsing],
Wang, S.J.[Shiuh-Jeng],
Dynamic embedding strategy of VQ-based information hiding approach,
JVCIR(59), 2019, pp. 14-32.
Elsevier DOI
1903
Vector quantization, Dynamic embedding algorithm, Steganography
BibRef
Ahmadian, A.M.[Amir M.],
Amirmazlaghani, M.[Maryam],
A novel secret image sharing with steganography scheme utilizing
Optimal Asymmetric Encryption Padding and Information Dispersal
Algorithms,
SP:IC(74), 2019, pp. 78-88.
Elsevier DOI
1904
Secret sharing, Steganography, Image sharing
BibRef
Guo, Y.[Yue],
Zhang, W.M.[Wei-Ming],
Hou, D.D.[Dong-Dong],
Yao, Y.Z.[Yuan-Zhi],
Ge, S.K.[Shuang-Kui],
A fast coding method for distortion-free data hiding in high dynamic
range image,
RealTimeIP(16), No. 3, June 2019, pp. 611-622.
Springer DOI
1906
BibRef
Yang, C.N.[Ching-Nung],
Chou, Y.S.[Yung-Shun],
Liu, Y.X.[Yan-Xiao],
Kim, C.[Cheonshik],
Exploiting error control in matrix coding-based data hiding over lossy
channel,
RealTimeIP(16), No. 3, June 2019, pp. 577-588.
Springer DOI
1906
BibRef
Zhang, H.[Hua],
Hu, L.[Liting],
A data hiding scheme based on multidirectional line encoding and
integer wavelet transform,
SP:IC(78), 2019, pp. 331-344.
Elsevier DOI
1909
Data hiding, Multidirectional line encoding(MDLE),
Integer wavelet transform(IWT), Embedding capacity, Imperceptibility
BibRef
Liu, Y.X.[Yan-Xiao],
Yang, C.N.[Ching-Nung],
Sun, Q.D.[Qin-Dong],
Wu, S.Y.[Song-Yu],
Lin, S.S.[Shin-Shang],
Chou, Y.S.[Yung-Shun],
Enhanced embedding capacity for the SMSD-based data-hiding method,
SP:IC(78), 2019, pp. 216-222.
Elsevier DOI
1909
Data hiding, Embedding capacity, Sparse MSD, Enhanced MSD, Section-wise
BibRef
Wang, Z.,
Zhang, X.,
Qian, Z.,
Practical Cover Selection for Steganography,
SPLetters(27), 2020, pp. 71-75.
IEEE DOI
2001
Distortion, Distortion measurement, Feature extraction,
Wiener filters, Electronics packaging, Visualization,
distortion
BibRef
Yan, X.[Xuehu],
Gong, Q.H.[Qing-Hong],
Li, L.L.[Long-Long],
Yang, G.Z.[Guo-Zheng],
Lu, Y.L.[Yu-Liang],
Liu, J.J.[Jing-Ju],
Secret image sharing with separate shadow authentication ability,
SP:IC(82), 2020, pp. 115721.
Elsevier DOI
2001
Secret image sharing, Shadow authentication, Pixel expansion, Lossless recovery
BibRef
Fujii, M.[Mariko],
Shibuya, T.[Tomoharu],
Improvement of the Quality of Visual Secret Sharing Schemes with
Constraints on the Usage of Shares,
IEICE(E103-D), No. 1, January 2020, pp. 11-24.
WWW Link.
2001
BibRef
Zhang, Y.[Yi],
Luo, X.Y.[Xiang-Yang],
Zhu, X.D.[Xiao-Dong],
Li, Z.Y.[Zhen-Yu],
Bors, A.G.[Adrian G.],
Enhancing reliability and efficiency for real-time robust adaptive
steganography using cyclic redundancy check codes,
RealTimeIP(17), No. 1, February 2020, pp. 115-123.
Springer DOI
2002
BibRef
Xiao, D.,
Li, F.,
Wang, M.,
Zheng, H.,
A Novel High-Capacity Data Hiding in Encrypted Images Based on
Compressive Sensing Progressive Recovery,
SPLetters(27), 2020, pp. 296-300.
IEEE DOI
2003
Data hiding, encrypted domain, compressive sensing,
prediction coding, embedding capability
BibRef
Prasad, S.[Shiv],
Pal, A.K.[Arup Kumar],
Stego-key-based image steganography scheme using edge detector and
modulus function,
IJCVR(10), No. 3, 2020, pp. 223-241.
DOI Link
2005
BibRef
Giboulot, Q.[Quentin],
Cogranne, R.[Rémi],
Borghys, D.[Dirk],
Bas, P.[Patrick],
Effects and solutions of Cover-Source Mismatch in image steganalysis,
SP:IC(86), 2020, pp. 115888.
Elsevier DOI
2006
Steganography, Steganalysis, Cover-source mismatch,
Image processing, Image heterogeneity
BibRef
Aghababaiyan, K.[Keyvan],
Mortazavi, A.S.[Amir S.],
Novel distortion free and histogram based data hiding scheme,
IET-IPR(14), No. 9, 20 July 2020, pp. 1716-1725.
DOI Link
2007
BibRef
Sardar, M.K.[Md Kutubuddin],
Adhikari, A.[Avishek],
Essential secret image sharing scheme with small and equal sized
shadows,
SP:IC(87), 2020, pp. 115923.
Elsevier DOI
2007
Grayscale image, Finite field, -threshold secret sharing scheme
BibRef
Zhang, Y.,
Luo, X.,
Guo, Y.,
Qin, C.,
Liu, F.,
Multiple Robustness Enhancements for Image Adaptive Steganography in
Lossy Channels,
CirSysVideo(30), No. 8, August 2020, pp. 2750-2764.
IEEE DOI
2008
Image coding, Resistance, Robustness, Transform coding,
Discrete cosine transforms, Feature extraction,
RS-STC codes
BibRef
Wang, Y.G.,
Zhu, G.,
Li, J.,
Conti, M.,
Huang, J.,
Defeating Lattice-Based Data Hiding Code Via Decoding Security Hole,
CirSysVideo(31), No. 1, January 2021, pp. 76-87.
IEEE DOI
2101
Watermarking, Lattices, Decoding, Estimation, Quantization (signal),
Indexes, Data hiding, watermarking security, lattice code,
perfect decoding
BibRef
Wang, Z.,
Feng, G.,
Ren, Y.,
Zhang, X.,
Multichannel Steganography in Digital Images for Multiple Receivers,
MultMedMag(28), No. 1, January 2021, pp. 65-73.
IEEE DOI
2104
Receivers, Data mining, Distortion, Media, Digital images,
Feature extraction, Image coding, Steganography, Steganography,
Sequential
BibRef
Yan, X.[Xuehu],
Lu, Y.L.[Yu-Liang],
Yang, C.N.[Ching-Nung],
Zhang, X.P.[Xin-Peng],
Wang, S.D.[Shu-Dong],
A Common Method of Share Authentication in Image Secret Sharing,
CirSysVideo(31), No. 7, July 2021, pp. 2896-2908.
IEEE DOI
2107
Authentication, Encryption, Gray-scale,
Digital images, Complexity theory, Image secret sharing,
no pixel expansion
BibRef
Zhu, J.H.[Jia-Hao],
Zhang, Y.S.[Yu-Shu],
Zhang, X.P.[Xin-Peng],
Cao, X.C.[Xiao-Chun],
Gaussian Model for 3D Mesh Steganography,
SPLetters(28), 2021, pp. 1729-1733.
IEEE DOI
2109
Solid modeling, Correlation, Payloads,
Faces, Task analysis, Probability density function, 3D mesh,
mesh steganography
BibRef
Chen, Y.L.[Yan-Li],
Wang, H.X.[Hong-Xia],
Wu, H.Z.[Han-Zhou],
Zhou, Y.H.[Yong-Hui],
Zhou, L.[Limengnan],
Chen, Y.[Yi],
Exploiting texture characteristics and spatial correlations for
robustness metric of data hiding with noisy transmission,
IET-IPR(15), No. 13, 2021, pp. 3160-3171.
DOI Link
2110
BibRef
Cui, J.B.[Jia-Bao],
Zhang, P.Y.[Peng-Yi],
Li, S.Y.[Song-Yuan],
Zheng, L.L.[Liang-Li],
Bao, C.[Cuizhu],
Xia, J.P.[Ju-Peng],
Li, X.[Xi],
Multitask Identity-Aware Image Steganography via Minimax Optimization,
IP(30), 2021, pp. 8567-8579.
IEEE DOI
2110
Containers, Image recognition, Image restoration, Optimization,
Visualization, Privacy, Encryption, Image steganography,
multitask learning
BibRef
Guan, Q.X.[Qing-Xiao],
Chen, H.[Hefeng],
Zhang, W.M.[Wei-Ming],
Yu, N.H.[Neng-Hai],
Improving UNIWARD distortion function via isotropic construction and
hierarchical merging,
JVCIR(81), 2021, pp. 103333.
Elsevier DOI
2112
Steganography, Distortion, UNIWARD
BibRef
Yang, Z.J.[Zi-Jin],
Chen, K.J.[Ke-Jiang],
Zeng, K.[Kai],
Zhang, W.M.[Wei-Ming],
Yu, N.H.[Neng-Hai],
Provably Secure Robust Image Steganography,
MultMed(26), 2024, pp. 5040-5053.
IEEE DOI
2404
Steganography, Security, Robustness, Generators,
Social networking (online), Receivers, Transforms, Steganography,
optimization
BibRef
Xia, C.[Chao],
Guan, Q.X.[Qing-Xiao],
Zhao, X.F.[Xian-Feng],
Dong, J.[Jing],
Xu, Z.J.[Zhou-Jun],
Improving spatial image adaptive steganalysis incorporating the
embedding impact on the feature,
ICIP17(515-519)
IEEE DOI
1803
Detectors, Distortion, Feature extraction, Histograms, Payloads,
Quantization (signal), Random variables, Adaptive steganalysis,
distinguishable L1 distortion
BibRef
Zeng, K.[Kai],
Chen, K.J.[Ke-Jiang],
Zhang, W.M.[Wei-Ming],
Wang, Y.F.[Yao-Fei],
Upward Robust Steganography Based on Overflow Alleviation,
MultMed(26), 2024, pp. 299-312.
IEEE DOI
2401
BibRef
Yu, X.Z.[Xin-Zhi],
Chen, K.J.[Ke-Jiang],
Zhang, W.M.[Wei-Ming],
Wang, Y.F.[Yao-Fei],
Yu, N.H.[Neng-Hai],
Improving the Embedding Strategy for Batch Adaptive Steganography,
IWDW18(248-260).
Springer DOI
1905
BibRef
Wang, Z.C.[Zi-Chi],
Feng, G.R.[Guo-Rui],
Zhang, X.P.[Xin-Peng],
Repeatable Data Hiding: Towards the Reusability of Digital Images,
CirSysVideo(32), No. 1, January 2022, pp. 135-146.
IEEE DOI
2201
Authentication, Distortion, Payloads, Mathematical model,
Fingerprint recognition, Usability, Remote sensing, Data hiding,
distortion
BibRef
Li, F.Y.[Feng-Yong],
Zeng, Y.[Yishu],
Zhang, X.P.[Xin-Peng],
Qin, C.[Chuan],
Ensemble Stego Selection for Enhancing Image Steganography,
SPLetters(29), 2022, pp. 702-706.
IEEE DOI
2203
Costs, Steganography, Distortion, Feature extraction, Training,
Graphics, Convolutional codes, Ensemble selection, gradient,
image steganography
BibRef
Soreng, A.V.[Aswini Vinay],
Kandar, S.[Shyamalendu],
Verifiable varying sized (m,n,n) multi-image secret sharing with
combiner verification and cheater identification,
JVCIR(84), 2022, pp. 103466.
Elsevier DOI
2204
Multi-image secret sharing, Varying sized,
Verifiable multi image secret sharing, Dealer authentication,
Combiner verification
BibRef
Gajabe, R.[Rajashree],
Ali, S.T.[Syed Taqi],
Secret Key-Based Image Steganography in Spatial Domain,
IJIG(22), No. 2, April 2022, pp. 2250014.
DOI Link
2205
BibRef
Zhu, L.Y.[Li-Yan],
Luo, X.Y.[Xiang-Yang],
Zhang, Y.[Yi],
Yang, C.F.[Chun-Fang],
Liu, F.L.[Fen-Lin],
Inverse Interpolation and Its Application in Robust Image
Steganography,
CirSysVideo(32), No. 6, June 2022, pp. 4052-4064.
IEEE DOI
2206
Interpolation, Distortion, Resists, Propagation losses, Watermarking,
Mathematical model, Image coding, Robust image steganography,
statistical detection
BibRef
Xing, F.Y.[Feng-Yue],
Yan, X.[Xuehu],
Yu, L.[Long],
Sun, Y.Y.[Yu-Yuan],
Information hiding in the sharing domain,
JVCIR(86), 2022, pp. 103520.
Elsevier DOI
2206
Secret image sharing, Random element utilization model, Information hiding
BibRef
Liu, X.Y.[Xi-Yao],
Ma, Z.P.[Zi-Ping],
Chen, Z.H.[Zhi-Hong],
Li, F.F.[Fang-Fang],
Jiang, M.[Ming],
Schaefer, G.[Gerald],
Fang, H.[Hui],
Hiding multiple images into a single image via joint compressive
autoencoders,
PR(131), 2022, pp. 108842.
Elsevier DOI
2208
Image hiding, Neural networks, Deep learning, Compressive autoencoder
BibRef
Liu, X.Y.[Xi-Yao],
Ma, Z.P.[Zi-Ping],
Ma, J.X.[Jun-Xing],
Zhang, J.[Jian],
Schaefer, G.[Gerald],
Fang, H.[Hui],
Image Disentanglement Autoencoder for Steganography without Embedding,
CVPR22(2293-2302)
IEEE DOI
2210
Steganography, Resists, Pattern recognition, Security, Reliability,
Capacity planning, Vision applications and systems,
Image and video synthesis and generation
BibRef
Liu, X.Y.[Xi-Yao],
Ma, Z.P.[Zi-Ping],
Guo, X.B.[Xing-Bei],
Hou, J.L.[Jia-Lu],
Wang, L.[Lei],
Zhang, J.[Jian],
Schaefer, G.[Gerald],
Fang, H.[Hui],
Joint compressive autoencoders for full-image-to-image hiding,
ICPR21(7743-7750)
IEEE DOI
2105
Learning systems, Visualization, Image coding,
Image representation, Containers, Security, compressive autoencoder
BibRef
Khan, A.A.[Abdullah Ayub],
Shaikh, A.A.[Aftab Ahmed],
Cheikhrouhou, O.[Omar],
Laghari, A.A.[Asif Ali],
Rashid, M.[Mamoon],
Shafiq, M.[Muhammad],
Hamam, H.[Habib],
IMG-forensics: Multimedia-enabled information hiding investigation
using convolutional neural network,
IET-IPR(16), No. 11, 2022, pp. 2854-2862.
DOI Link
2208
BibRef
Chen, Y.J.[Yi-Jing],
Wang, H.X.[Hong-Xia],
Li, W.[Wanjie],
Luo, J.[Jie],
Cost Reassignment for Improving Security of Adaptive Steganography
Using an Artificial Immune System,
SPLetters(29), 2022, pp. 1564-1568.
IEEE DOI
2208
Steganography, Costs, Security, Artificial intelligence,
Cost function, Transforms, Statistics,
artificial immune system
BibRef
Chen, M.[Menghua],
He, P.S.[Pei-Song],
Liu, J.Y.[Jia-Yong],
HLTD-CSA: Cover selection algorithm based on hybrid local texture
descriptor for color image steganography,
JVCIR(89), 2022, pp. 103646.
Elsevier DOI
2212
Color image steganography, Cover selection,
Hybrid local texture, Channel correlations
BibRef
Li, G.F.[Guo-Feng],
Feng, B.W.[Bing-Wen],
He, M.J.[Ming-Jin],
Weng, J.[Jian],
Lu, W.[Wei],
High-capacity coverless image steganographic scheme based on image
synthesis,
SP:IC(111), 2023, pp. 116894.
Elsevier DOI
2301
Coverless image steganography, High capacity, Image synthesis,
Cross-domain image translation
BibRef
Feng, B.W.[Bing-Wen],
Lu, W.[Wei],
Sun, W.[Wei],
High Capacity Data Hiding Scheme for Binary Images Based on Minimizing
Flipping Distortion,
IWDW13(514-528).
Springer DOI
1407
BibRef
Wei, P.[Ping],
Zhu, Z.Y.[Zhi-Ying],
Luo, G.[Ge],
Qian, Z.X.[Zhen-Xing],
Zhang, X.P.[Xin-Peng],
Breaking Robust Data Hiding in Online Social Networks,
SPLetters(29), 2022, pp. 2682-2686.
IEEE DOI
2301
Un-hiding the information without knowing the key.
Image fusion, Steganography, Kernel, Watermarking, Smoothing methods,
Image quality, Social networking (online), Image sanitization, secret removal
BibRef
Wu, H.Z.[Han-Zhou],
Li, C.[Chen],
Liu, G.[Gen],
Zhang, X.P.[Xin-Peng],
Hiding data hiding,
PRL(165), 2023, pp. 122-127.
Elsevier DOI
2301
Hiding data hiding, Covert communication, Deep learning, Security
BibRef
Feng, B.W.[Bing-Wen],
Li, G.F.[Guo-Feng],
Luo, Z.Q.[Zhi-Quan],
Lu, W.[Wei],
Multilevel histogram shape-based image watermarking invariant to
geometric attacks,
IET-IPR(17), No. 7, 2023, pp. 2097-2112.
DOI Link
2305
geometric attacks, histogram shape, image watermarking,
robustness, security of data
BibRef
Feng, B.W.[Bing-Wen],
Weng, J.[Jian],
Lu, W.[Wei],
Improved Algorithms for Robust Histogram Shape-Based Image Watermarking,
IWDW17(275-289).
Springer DOI
1708
BibRef
Meng, L.[Laijin],
Jiang, X.H.[Xing-Hao],
Zhang, Z.Z.[Zhen-Zhen],
Li, Z.H.[Zhao-Hong],
Sun, T.F.[Tan-Feng],
A Robust Coverless Image Steganography Based on an End-to-End Hash
Generation Model,
CirSysVideo(33), No. 7, July 2023, pp. 3542-3558.
IEEE DOI
2307
Steganography, Feature extraction, Robustness, Indexes, Receivers,
Image segmentation, Resists, Coverless information hiding,
end-to-end hash generation
BibRef
Prasad, S.[Shiv],
Pal, A.K.[Arup Kumar],
Mukherjee, S.[Soumya],
An RGB Color Image Steganography Scheme by Binary Lower Triangular
Matrix,
ITS(24), No. 7, July 2023, pp. 6865-6873.
IEEE DOI
2307
Steganography, Color, Image color analysis, Visualization, Payloads,
Streaming media, Genetic algorithms, Color image steganography, stego-image
BibRef
Singh, O.P.[Om Prakash],
Singh, A.K.[Amit Kumar],
Zhou, H.Y.[Hui-Yu],
Multimodal Fusion-Based Image Hiding Algorithm for Secure Healthcare
System,
IEEE_Int_Sys(38), No. 4, July 2023, pp. 53-61.
IEEE DOI
2309
BibRef
Majumder, A.[Anandaprova],
Kundu, S.[Sumana],
Changder, S.[Suvamoy],
A unique database synthesis technique for coverless data hiding,
JVCIR(96), 2023, pp. 103911.
Elsevier DOI
2310
Security and privacy protection, Coverless data hiding,
Privacy attacks, Object synthesis, Database synthesis, Steganography
BibRef
Zhang, L.[Le],
Lu, Y.[Yao],
Li, T.[Tong],
Lu, G.M.[Guang-Ming],
Joint adjustment image steganography networks,
SP:IC(118), 2023, pp. 117022.
Elsevier DOI
2310
Image steganography, Image hiding, Joint adjustment, JAIS-nets
BibRef
Xu, S.Y.[Shu-Ying],
Chang, C.C.[Chin-Chen],
Horng, J.H.[Ji-Hwei],
Image Covert Communication With Block Regulation,
SPLetters(30), 2023, pp. 1217-1221.
IEEE DOI
2310
BibRef
Zhang, X.B.[Xuan-Bo],
Zhang, X.P.[Xin-Peng],
Feng, G.R.[Guo-Rui],
Image Steganalysis Network Based on Dual-Attention Mechanism,
SPLetters(30), 2023, pp. 1287-1291.
IEEE DOI
2310
BibRef
Wang, Z.C.[Zi-Chi],
Feng, G.R.[Guo-Rui],
Zhang, X.P.[Xin-Peng],
Steganographic Distortion Function for Enhanced Images,
IWDW20(31-40).
Springer DOI
2103
BibRef
Zeng, K.[Kai],
Chen, K.J.[Ke-Jiang],
Zhang, W.M.[Wei-Ming],
Wang, Y.F.[Yao-Fei],
Yu, N.H.[Neng-Hai],
Robust Steganography for High Quality Images,
CirSysVideo(33), No. 9, September 2023, pp. 4893-4906.
IEEE DOI
2310
BibRef
Wu, X.T.[Xiao-Tian],
Xu, Z.[Zishuo],
Yan, W.Q.[Wei-Qi],
Sharing Visual Secrets Among Multiple Groups With Enhanced
Performance,
CirSysVideo(33), No. 11, November 2023, pp. 6503-6518.
IEEE DOI
2311
BibRef
Yin, X.L.[Xiao-Lin],
Wu, S.[Shaowu],
Wang, K.[Ke],
Lu, W.[Wei],
Zhou, Y.C.[Yi-Cong],
Huang, J.W.[Ji-Wu],
Anti-Rounding Image Steganography With Separable Fine-Tuned Network,
CirSysVideo(33), No. 11, November 2023, pp. 7066-7079.
IEEE DOI
2311
BibRef
Zou, L.M.[Li-Ming],
Li, J.[Jing],
Wan, W.B.[Wen-Bo],
Wu, Q.M.J.[Q. M. Jonathan],
Sun, J.D.[Jian-De],
Robust Coverless Image Steganography Based on Neglected Coverless
Image Dataset Construction,
MultMed(25), 2023, pp. 5552-5564.
IEEE DOI
2311
BibRef
Cui, Q.[Qi],
Zhou, Z.[Zhili],
Meng, R.[Ruohan],
Wang, S.W.[Shao-Wei],
Yan, H.Y.[Hong-Yang],
Wu, Q.M.J.[Q. M. Jonathan],
ARES: On Adversarial Robustness Enhancement for Image Steganographic
Cost Learning,
MultMed(26), 2024, pp. 6542-6553.
IEEE DOI
2404
Cost function, Steganography, Costs, Generators, Feature extraction,
Training, Generative adversarial networks, Steganography, GAN, Cost learning
BibRef
He, J.[Jian],
Weng, S.W.[Shao-Wei],
Yu, L.F.[Li-Fang],
Zhang, C.Y.[Chun-Yu],
Chen, W.[Wei],
An Image Steganoganalyzer With Comprehensive Detection Performance,
SPLetters(30), 2023, pp. 1682-1686.
IEEE DOI
2312
BibRef
Li, W.J.[Wan-Jie],
Wang, H.X.[Hong-Xia],
Chen, Y.J.[Yi-Jing],
Abdullahi, S.M.[Sani M.],
Luo, J.[Jie],
Constructing Immunized Stego-Image for Secure Steganography via
Artificial Immune System,
MultMed(25), 2023, pp. 8320-8333.
IEEE DOI
2312
BibRef
Wang, H.X.[Hong-Xia],
Chen, Z.L.[Zhi-Long],
He, P.S.[Pei-Song],
Constructing Immune Cover for Secure Steganography Based on an
Artificial Immune System Approach,
IWDW20(53-67).
Springer DOI
2103
BibRef
Xiang, L.Y.[Ling-Yun],
Xia, J.L.[Jia-Li],
Liu, Y.F.[Yang-Fan],
Gui, Y.[Yan],
CPG-LS: Causal Perception Guided Linguistic Steganography,
SPLetters(30), 2023, pp. 1762-1766.
IEEE DOI
2312
BibRef
Weng, S.W.[Shao-Wei],
Sun, S.[Shiyao],
Yu, L.F.[Li-Fang],
Fast SwT-Based Deep Steganalysis Network for Arbitrary-Sized Images,
SPLetters(30), 2023, pp. 1782-1786.
IEEE DOI
2312
BibRef
Saeidi, Z.[Zahra],
Yazdi, A.[Ameneh],
Mashhadi, S.[Samaneh],
Hadian, M.[Masoud],
Gutub, A.[Adnan],
High performance image steganography integrating IWT and Hamming code
within secret sharing,
IET-IPR(18), No. 1, 2024, pp. 129-139.
DOI Link
2401
image watermarking, steganography
BibRef
Wang, R.[Rui],
Yang, G.Z.[Guo-Zheng],
Yan, X.[Xuehu],
Luo, S.Y.[Sheng-Yang],
Han, Q.[Qiang],
Secret image sharing in the encrypted domain,
JVCIR(98), 2024, pp. 104013.
Elsevier DOI
2402
Secret image sharing, Image encrypted domain,
Formal definition, Evaluation metrics
BibRef
Ma, Y.Y.[Yuan-Yuan],
Xu, L.[Lige],
Zhang, Y.[Yi],
Zhang, T.[Tao],
Luo, X.Y.[Xiang-Yang],
Steganalysis Feature Selection With Multidimensional Evaluation and
Dynamic Threshold Allocation,
CirSysVideo(34), No. 3, March 2024, pp. 1954-1969.
IEEE DOI
2403
Feature extraction, Resource management, Deep learning, Steganography,
Principal component analysis, Dynamic scheduling, cosine similarity
BibRef
Duan, X.T.[Xin-Tao],
Wu, G.M.[Guo-Ming],
Li, C.[Chun],
Li, Z.[Zhuang],
Qin, C.[Chuan],
DUIANet: A double Layer U-Net Image Hiding Method Based on Improved
Inception Module and Attention Mechanism,
JVCIR(98), 2024, pp. 104035.
Elsevier DOI
2402
Image hiding, Attention mechanism, Improved Inception module, Double-layer U-Net
BibRef
Yao, Y.[Ye],
Huang, L.C.[Lin-Chao],
Wang, H.[Hui],
Chang, Q.[Qi],
Ren, Y.Z.[Yi-Zhi],
Xiao, F.J.[Feng-Jun],
Robust Adaptive Steganography Based on Adaptive STC-ECC,
MultMed(26), 2024, pp. 5477-5489.
IEEE DOI
2404
Security, Robustness, Steganography, Transform coding,
Discrete cosine transforms, Image coding, Error correction codes,
adaptive STC-ECC strategy
BibRef
Weng, S.W.[Shao-Wei],
Zhang, Z.[Zhuwei],
Yu, L.F.[Li-Fang],
Cao, P.[Peng],
Cao, G.[Gang],
Universal Mismatched Steganalysis Equipped With Progressive
Intermediate Domains,
SPLetters(31), 2024, pp. 800-804.
IEEE DOI
2404
Transform coding, Feature extraction, Training, Symbols,
Steganography, Entropy, Bridges, Stegananlysis, CSM, IDGM, LFMP
BibRef
Fu, Z.X.[Zheng-Xin],
Huang, H.Y.[Hang-Ying],
Yu, B.[Bin],
Li, X.P.[Xiao-Peng],
Size-invariant two-in-one image secret sharing scheme based on gray
mixing model,
JVCIR(100), 2024, pp. 104134.
Elsevier DOI
2405
Size-invariant Visual Cryptography Scheme, TiOISSS,
Multi-level grayscale image, Grayscale probabilistic matrix
BibRef
Li, X.P.[Xiao-Peng],
Fu, Z.X.[Zheng-Xin],
Yu, B.[Bin],
A novel extended secret image sharing scheme based on sharing matrix,
JVCIR(101), 2024, pp. 104149.
Elsevier DOI
2406
Secret image sharing, No pixel expansion,
Meaningful natural shares, Search window
BibRef
Dharwadkar, N.V.[Nagaraj V.],
Lonikar, A.A.[Ashutosh A.],
Mahmud, M.[Mufti],
High Embedding Capacity Color Image Steganography Scheme Using Pixel
Value Differencing and Addressing the Falling-Off Boundary Problem,
IJIG(24), No. 4, July 2024, pp. 2450047.
DOI Link
2408
BibRef
Cheng, Z.[Zien],
Jin, X.[Xin],
Jiang, Q.[Qian],
Wu, L.W.[Li-Wen],
Dong, Y.Y.[Yun-Yun],
Zhou, W.[Wei],
SIHNet: A safe image hiding method with less information leaking,
IET-IPR(18), No. 10, 2024, pp. 2800-2815.
DOI Link
2408
data privacy, image watermarking,
learning (artificial intelligence), security of data, signal processing
BibRef
Fu, H.C.[Hao-Cheng],
Zhao, X.F.[Xian-Feng],
He, X.L.[Xiao-Lei],
High-performance Steganographic Coding Based on Sub-polarized Channel,
IWDW22(3-19).
Springer DOI
2307
BibRef
Jia, J.[Jun],
Gao, Z.P.[Zhong-Pai],
Zhu, D.D.[Dan-Dan],
Min, X.K.[Xiong-Kuo],
Zhai, G.T.[Guang-Tao],
Yang, X.K.[Xiao-Kang],
Learning Invisible Markers for Hidden Codes in Offline-to-online
Photography,
CVPR22(2263-2272)
IEEE DOI
2210
Training, Photography, Location awareness, Visualization,
Technological innovation, Codes, Vision applications and systems,
Computer vision for social good
BibRef
Bertojo, L.[Laura],
Puech, W.[William],
Correction of Secret Images Reconstructed from Noised Shared Images,
IPTA22(1-6)
IEEE DOI
2206
Steganography, Image coding, Databases, Image edge detection,
Mathematical analysis, Transform coding, Information security,
Error correction
BibRef
Feng, B.W.[Bing-Wen],
Liu, Z.Q.[Zhi-Quan],
Wei, K.M.[Kai-Min],
Lu, W.[Wei],
Lin, Y.C.[Yu-Chun],
Variable Rate Syndrome-trellis Codes for Steganography on Bursty
Channels,
IWDW20(15-30).
Springer DOI
2103
BibRef
Hu, Y.T.[Yu-Ting],
Yang, Z.L.[Zhong-Liang],
Cao, H.[Han],
Huang, Y.F.[Yong-Feng],
Multi-modal Steganography Based on Semantic Relevancy,
IWDW20(3-14).
Springer DOI
2103
BibRef
Zhao, X.F.[Xian-Feng],
Yang, C.F.[Chun-Fang],
Liu, F.L.[Fen-Lin],
On the Sharing-based Model of Steganography,
IWDW20(94-105).
Springer DOI
2103
BibRef
El-Arsh, H.Y.,
Abdelaziz, A.,
Elliethy, A.,
Aly, H.A.,
Fundamental Limits Of Steganographic Capacity For
Multivariate-Quantized-Gaussian-Distributed Multimedia,
ICIP20(1246-1250)
IEEE DOI
2011
Entropy, Detectors, Streaming media, Videos, Mutual information,
Optimization, Probability
BibRef
Ong, S.,
Wong, K.,
Information Hiding In Image Enhancement,
ICIP20(1261-1265)
IEEE DOI
2011
Data mining, Error analysis, Image quality, Image enhancement,
Speckle, Noise level, Median filter,
data extraction error rate
BibRef
Tancik, M.,
Mildenhall, B.,
Ng, R.,
StegaStamp: Invisible Hyperlinks in Physical Photographs,
CVPR20(2114-2123)
IEEE DOI
2008
Robustness, Decoding, Cameras, Hypertext systems,
Perturbation methods, Image coding, Image color analysis
BibRef
Ma, J.F.[Jian-Feng],
Yin, L.P.[Li-Ping],
Li, P.[Peng],
Cheating Detection in (k, n) Secret Image Sharing Scheme,
IWDW19(421-428).
Springer DOI
2003
BibRef
Gong, C.[Chen],
Zhao, X.F.[Xian-Feng],
New Steganalytic Approach for AMR Steganography Based on Block-wise of
Pulse Position Distribution and Neighboring Joint Density,
IWDW19(307-321).
Springer DOI
2003
BibRef
Xu, M.T.[Meng-Tian],
Wu, H.Z.[Han-Zhou],
Feng, G.R.[Guo-Rui],
Zhang, X.P.[Xin-Peng],
Ding, F.[Feng],
Broadcasting Steganography in the Blockchain,
IWDW19(256-267).
Springer DOI
2003
BibRef
Zhou, S.J.[Shi-Jun],
Tang, W.X.[Wei-Xuan],
Tan, S.Q.[Shun-Quan],
Li, B.[Bin],
Content-Adaptive Steganalysis via Augmented Utilization of
Selection-Channel Information,
IWDW18(261-274).
Springer DOI
1905
BibRef
Yan, X.[Xuehu],
Lu, Y.L.[Yu-Liang],
Liu, L.T.[Lin-Tao],
Wan, S.[Song],
Ding, W.M.[Wan-Meng],
Liu, H.L.[Han-Lin],
Secret Image Sharing for (k, k) Threshold Based on Chinese Remainder
Theorem and Image Characteristics,
PSIVT17(174-181).
Springer DOI
1802
BibRef
Guan, Q.X.[Qing-Xiao],
Dong, J.[Jing],
Tan, T.N.[Tie-Niu],
An effective image steganalysis method based on neighborhood
information of pixels,
ICIP11(2721-2724).
IEEE DOI
1201
BibRef
Guan, Q.X.[Qing-Xiao],
Dong, J.[Jing],
Tan, T.N.[Tie-Niu],
Blind Quantitative Steganalysis Based on Feature Fusion and Gradient
Boosting,
DW10(266-279).
Springer DOI
1010
BibRef
Dong, J.[Jing],
Chen, X.C.[Xiao-Chuan],
Guo, L.[Lei],
Tan, T.N.[Tie-Niu],
Fusion Based Blind Image Steganalysis by Boosting Feature Selection,
DW07(87-98).
Springer DOI
0712
BibRef
Chen, X.C.[Xiao-Chuan],
Wang, Y.H.[Yun-Hong],
Tan, T.N.[Tie-Niu],
Guo, L.[Lei],
Blind Image Steganalysis Based on Statistical Analysis of Empirical
Matrix,
ICPR06(III: 1107-1110).
IEEE DOI
0609
BibRef
Hu, D.H.[Dong-Hui],
Ma, Z.J.[Zhong-Jin],
Fan, Y.Q.[Yu-Qi],
Wang, L.[Lina],
A Study of the Two-Way Effects of Cover Source Mismatch and Texture
Complexity in Steganalysis,
IWDW16(601-615).
Springer DOI
1703
BibRef
Huang, W.[Wei],
Zhao, X.F.[Xian-Feng],
Reliable Pooled Steganalysis Using Fine-Grained Parameter Estimation
and Hypothesis Testing,
IWDW16(550-563).
Springer DOI
1703
BibRef
Chang, C.C.[Chin-Chen],
Chang, J.C.[Jen-Chun],
Chou, Y.H.[Yun-Hong],
Wu, H.L.[Hsin-Lung],
A High Embedding Capacity Data Hiding Scheme Based upon Permutation
Vectors,
IWDW16(578-587).
Springer DOI
1703
BibRef
Zhao, Z.Z.[Zeng-Zhen],
Guan, Q.X.[Qing-Xiao],
Zhao, X.F.[Xian-Feng],
Yu, H.B.[Hai-Bo],
Liu, C.J.[Chang-Jun],
Embedding Strategy for Batch Adaptive Steganography,
IWDW16(494-505).
Springer DOI
1703
BibRef
Wang, R.[Ran],
Ping, X.J.[Xi-Jian],
Niu, S.Z.[Shao-Zhang],
Zhang, T.[Tao],
Segmentation Based Steganalysis of Spatial Images Using Local Linear
Transform,
IWDW16(533-549).
Springer DOI
1703
BibRef
Bian, Y.[Yuan],
Tang, G.M.[Guang-Ming],
Wang, S.[Shuo],
Gao, Z.Z.[Zhan-Zhan],
Chen, S.Y.[Shi-Yuan],
Adaptive Steganography Using 2D Gabor Filters and Ensemble Classifiers,
IWDW16(506-517).
Springer DOI
1703
BibRef
Lin, Q.,
Liu, J.,
Guo, Z.,
Local ternary pattern based on path integral for steganalysis,
ICIP16(2737-2741)
IEEE DOI
1610
Calibration
BibRef
Sedighi, V.,
Fridrich, J.,
Effect of saturated pixels on security of steganographic schemes for
digital images,
ICIP16(2747-2751)
IEEE DOI
1610
Databases
BibRef
Renza, D.[Diego],
Ballesteros L., D.M.[Dora M.],
Sanchez, J.[Jeisson],
Highly Transparent Steganography Scheme of Speech Signals into Color
Images Using Quantization Index Modulation,
MCPR16(241-250).
Springer DOI
1608
BibRef
Lin, X.[Xu],
Feng, B.W.[Bing-Wen],
Lu, W.[Wei],
Sun, W.[Wei],
Content-Adaptive Residual for Steganalysis,
IWDW14(389-398).
Springer DOI
1602
BibRef
Chen, L.C.[Li-Cong],
Shi, Y.Q.[Yun-Qing],
Sutthiwan, P.[Patchara],
Variable Multi-dimensional Co-occurrence for Steganalysis,
IWDW14(559-573).
Springer DOI
1602
BibRef
Feng, B.W.[Bing-Wen],
Lu, W.[Wei],
Dai, L.[Lu],
Sun, W.[Wei],
Steganography Based on High-Dimensional Reference Table,
IWDW14(574-587).
Springer DOI
1602
BibRef
Itier, V.,
Puech, W.[William],
Pedeboy, J.P.[Jean-Pierre],
Highcapacity data-hiding for 3D meshes based on static arithmetic
coding,
ICIP15(4575-4579)
IEEE DOI
1511
3D data hiding; geometry synchronization; high capacity
BibRef
Xu, X.[Xikai],
Dong, J.[Jing],
Wang, W.[Wei],
Tan, T.N.[Tie-Niu],
Robust steganalysis based on training set construction and ensemble
classifiers weighting,
ICIP15(1498-1502)
IEEE DOI
1511
Steganography; ensemble classifiers; sample selection; steganalysis
BibRef
Mohanty, M.,
Gehrmann, C.,
Atrey, P.K.,
Avoiding weak parameters in secret image sharing,
VCIP14(506-509)
IEEE DOI
1504
cryptography
BibRef
Lee, S.K.[Suk Kyu],
Bae, M.Y.[Mung-Yu],
Chung, A.Y.,
Kim, H.[Hwangnam],
D-mago: A novel visual entity for storing emotional feeling with
visual imprint,
VCIP14(466-469)
IEEE DOI
1504
image processing. Data hiding.
BibRef
Mahajan, M.,
Kaur, N.,
Secret communication in colored images using saliency map as model,
AIPR14(1-10)
IEEE DOI
1504
image coding
BibRef
Dominguez-Conde, G.[Gabriel],
Comesana-Alfaro, P.[Pedro],
Perez-Gonzalez, F.[Fernando],
A new look at ML step-size estimation for Scalar Costa scheme data
hiding,
ICIP14(4211-4215)
IEEE DOI
1502
Bit error rate
BibRef
Qiao, T.[Tong],
Zitzmann, C.[Cathel],
Retraint, F.[Florent],
Cogranne, R.[Remi],
Statistical detection of Jsteg steganography using hypothesis testing
theory,
ICIP14(5517-5521)
IEEE DOI
1502
Detectors
BibRef
Yang, Y.[Ying],
Pintus, R.[Ruggero],
Rushmeier, H.[Holly],
Ivrissimtzis, I.[Ioannis],
A steganalytic algorithm for 3D polygonal meshes,
ICIP14(4782-4786)
IEEE DOI
1502
Accuracy
BibRef
Li, B.[Bin],
Wang, M.[Ming],
Huang, J.W.[Ji-Wu],
Li, X.L.[Xiao-Long],
A new cost function for spatial image steganography,
ICIP14(4206-4210)
IEEE DOI
1502
Additives
BibRef
Al-Dmour, H.[Hayat],
Ali, N.[Noman],
Al-Ani, A.[Ahmed],
An Efficient Hybrid Steganography Method Based on Edge Adaptive and
Tree Based Parity Check,
MMMod15(I: 1-12).
Springer DOI
1501
BibRef
Ou, D.H.[Duan-Hao],
Wu, X.T.[Xiao-Tian],
Dai, L.[Lu],
Sun, W.[Wei],
Secret Sharing in Images Based on Error-Diffused Block Truncation
Coding and Error Diffusion,
IWDW13(123-138).
Springer DOI
1407
BibRef
Liu, S.C.[Shen-Chuan],
Fujiyoshi, M.[Masaaki],
Kiya, H.[Hitoshi],
A Cheat-Prevention Visual Secret Sharing Scheme with Minimum Pixel
Expansion,
IWDW13(362-375).
Springer DOI
1407
BibRef
Köhler, O.M.[Olaf Markus],
Pasquini, C.[Cecilia],
Böhme, R.[Rainer],
On the Statistical Properties of Syndrome Trellis Coding,
IWDW17(331-346).
Springer DOI
1708
Use Syndrome Trellis Coding (STC) to control the selection of
embedding positions.
BibRef
Johnson, B.[Benjamin],
Schöttle, P.[Pascal],
Laszka, A.[Aron],
Grossklags, J.[Jens],
Böhme, R.[Rainer],
Bitspotting: Detecting Optimal Adaptive Steganography,
IWDW13(3-18).
Springer DOI
1407
BibRef
Singh, R.K.,
Lall, B.,
Saliency map based image steganography,
IVCNZ13(430-435)
IEEE DOI
1402
image watermarking
BibRef
Zeng, Y.C.[Yi-Chong],
Tsai, C.H.[Chi-Hung],
High capacity multi-scale image sharing scheme by combining visual
cryptography with data hiding,
ICIP13(4536-4539)
IEEE DOI
1402
Visual cryptography; capacity; data hiding; downscaling; secret sharing
BibRef
Wilkowski, A.[Artur],
Kasprzak, W.[Wlodzimierz],
Steganographic Authentication Method for Electronic IDs,
ICIAR13(726-733).
Springer DOI
1307
BibRef
Najeena, K.S.,
Imran, B.M.,
An efficient steganographic technique based on chaotic maps and
adpative PPM embedding,
ICSIPR13(293-297).
IEEE DOI
1304
BibRef
Nadiya, P.V.,
Imran, B.M.[B. Mohammed],
Image steganography in DWT domain using double-stegging with RSA
encryption,
ICSIPR13(283-287).
IEEE DOI
1304
BibRef
Chaumont, M.[Marc],
Kouider, S.[Sarra],
Steganalysis by ensemble classifiers with boosting by regression, and
post-selection of features,
ICIP12(1133-1136).
IEEE DOI
1302
BibRef
Mainberger, M.[Markus],
Schmaltz, C.[Christian],
Berg, M.[Matthias],
Weickert, J.[Joachim],
Backes, M.[Michael],
Diffusion-based Image Compression in Steganography,
ISVC12(II: 219-228).
Springer DOI
1209
BibRef
Wang, X.F.[Xiao-Feng],
Li, Z.[Zhen],
Zhang, X.[Xiaoni],
Wang, S.P.[Shang-Ping],
Chen, J.[Jing],
(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images,
IWDW11(425-438).
Springer DOI
1208
BibRef
Wang, H.T.[Hong-Tao],
Liu, M.[Meng],
Li, Q.[Qian],
Yang, H.T.[Hai-Tao],
Li, H.Q.[Hou-Qiang],
Region based motion vector prediction using data hiding and decoder
side reasoning,
VCIP11(1-4).
IEEE DOI
1201
BibRef
Niimi, M.[Michiharu],
Noda, H.[Hideki],
An application of Sparse Code Shrinkage to image steganalysis based on
supervised learning,
ICIP11(1941-1944).
IEEE DOI
1201
BibRef
Suresh, N.[Nakum],
Karthik, K.[Kannan],
Secure fingerprint embedding based on modified GDFT based parametric
transform,
ICIIP11(1-6).
IEEE DOI
1112
BibRef
Sharma, M.[Manoj],
Shukla, M.[Manoj],
Kaul, A.[Amit],
Image hiding using unitary similarity transformation,
ICIIP11(1-4).
IEEE DOI
1112
BibRef
Basu, A.[Abhishek],
Das, T.S.[Tirtha Sankar],
Sarkar, S.K.[Subir Kumar],
Majumder, S.[Swanirbhar],
On the implementation of a information hiding design based on saliency
map,
ICIIP11(1-6).
IEEE DOI
1112
BibRef
Arya, M.S.[Meenakshi S],
Jain, N.[Nikita],
Sisodia, J.[Jai],
Sehgal, N.[Nukul],
DNA encoding based feature extraction for biometric watermarking,
ICIIP11(1-6).
IEEE DOI
1112
BibRef
Kavehvash, Z.[Zahra],
Ghaemmaghami, S.[Shahrokh],
On Limits of Embedding in 3D Images Based on 2D Watson's Model,
DW10(293-304).
Springer DOI
1010
BibRef
Liwicki, M.[Marcus],
Uchida, S.[Seiichi],
Iwamura, M.[Masakazu],
Omachi, S.[Shinichiro],
Kise, K.[Koichi],
Embedding Meta-Information in Handwriting:
Reed-Solomon for Reliable Error Correction,
FHR10(51-56).
IEEE DOI
1011
BibRef
Wang, J.X.[Jun-Xiang],
Ni, J.Q.[Jiang-Qun],
A fast performance estimation scheme for histogram shifting based
multi-layer embedding,
ICIP10(3701-3704).
IEEE DOI
1009
a lossless data hiding scheme. Limited capacity.
BibRef
Guo, M.[Meng],
Zhang, H.B.[Hong-Bin],
High Capacity Data Hiding for Binary Image Authentication,
ICPR10(1441-1444).
IEEE DOI
1008
BibRef
Huang, C.P.[Chin-Pan],
A new scheme of sharing secrets in stego images with authentication,
ICIP09(1269-1272).
IEEE DOI
0911
BibRef
Gao, Y.K.[Yun-Kai],
Li, X.L.[Xiao-Long],
Zeng, T.Y.[Tie-Yong],
Yang, B.[Bin],
Improving embedding efficiency via matrix embedding: A case study,
ICIP09(109-112).
IEEE DOI
0911
BibRef
Gul, G.[Gokhan],
Kurugollu, F.[Fatih],
A novel universal steganalyser design: 'LogSv',
ICIP09(4249-4252).
IEEE DOI
0911
BibRef
Yu, X.Y.[Xiao Yi],
Wang, A.[Aiming],
An improved lossless data hiding based on space filling curves,
ICIP09(4221-4224).
IEEE DOI
0911
BibRef
Nabaee, H.,
Faez, K.,
An efficient steganography method based on reducing changes,
IVCNZ10(1-7).
IEEE DOI
1203
BibRef
Famili, Z.[Zainab],
Faez, K.[Karim],
Fadavi, A.[Abbas],
A New Steganography Based on L2 Technic,
CIARP09(1062-1069).
Springer DOI
0911
BibRef
Deng, Q.L.[Qian-Lan],
Lin, J.J.[Jia-Jun],
A Universal Steganalysis Using Features Derived from the Differential
Image Histogram in Frequency Domain,
CISP09(1-4).
IEEE DOI
0910
BibRef
Zhang, L.[Liang],
Wavelet Domain Steganalysis Based on Predictability Analysis and
Magnitude Prediction,
CISP09(1-4).
IEEE DOI
0910
BibRef
Yu, X.Y.[Xiao Yi],
Wang, A.[Aiming],
Steganography with Hash,
CISP09(1-4).
IEEE DOI
0910
BibRef
And:
Steganalysis Based on Bayesion Network and Genetic Algorithm,
CISP09(1-4).
IEEE DOI
0910
BibRef
Sohn, H.[Hosik],
Ro, Y.M.[Yong Man],
Plataniotis, K.N.[Kostantinos N.],
Content Sharing Based on Personal Information in Virtually Secured
Space,
DW08(388-400).
Springer DOI
0811
BibRef
Huang, H.J.[Hua-Jun],
Tan, J.S.[Jun-Shan],
Sun, X.M.[Xing-Ming],
Liu, L.X.[Ling-Xi],
Detection of Hidden Information in Webpage Based on Higher-Order
Statistics,
DW08(293-302).
Springer DOI
0811
BibRef
Wahab, A.W.A.[Ainuddin Wahid Abdul],
Briffa, J.A.[Johann A.],
Schaathun, H.G.[Hans Georg],
On the Performance of Wavelet Decomposition Steganalysis with JSteg
Steganography,
DW08(342-349).
Springer DOI
0811
BibRef
Li, T.[Ting],
Zhao, Y.[Yao],
Ni, R.R.[Rong-Rong],
Yu, L.F.[Li-Fang],
A High Capacity Steganographic Algorithm in Color Images,
DW08(218-228).
Springer DOI
0811
BibRef
Islam, N.[Naveed],
Puech, W.[William],
Brouzet, R.[Robert],
A Homomorphic Method for Sharing Secret Images,
DW09(121-135).
Springer DOI
0908
BibRef
Zheng, X.L.[Xue-Ling],
Huang, L.S.[Liu-Sheng],
Chen, Z.[Zhili],
Yu, Z.S.[Zhen-Shan],
Yang, W.[Wei],
Hiding Information by Context-Based Synonym Substitution,
DW09(162-169).
Springer DOI
0908
BibRef
Kim, S.[Semin],
de Neve, W.[Wesley],
Ro, Y.M.[Yong Man],
A Statistical and Iterative Method for Data Hiding in Palette-Based
Images,
DW09(170-183).
Springer DOI
0908
BibRef
Agrawal, N.[Neha],
Savvides, M.[Marios],
Biometric data hiding: A 3 factor authentication approach to verify
identity with a single image using steganography, encryption and
matching,
Biometrics09(85-92).
IEEE DOI
0906
BibRef
Shyu, S.J.[Shyong Jian],
Chuang, C.C.[Chun-Chieh],
Chen, Y.R.[Ying-Ru],
Lai, A.F.[Ah-Fur],
Weighted Threshold Secret Image Sharing,
PSIVT09(988-998).
Springer DOI
0901
BibRef
Sur, A.[Arijit],
Goel, P.[Piyush],
Mukhopadhyay, J.[Jayanta],
A New Approach for Reducing Embedding Noise in Multiple Bit Plane
Steganography,
ICISP08(580-587).
Springer DOI
0807
BibRef
Kang, X.G.[Xian-Gui],
Zhong, X.[Xiong],
Huang, J.W.[Ji-Wu],
Zeng, W.J.[Wen-Jun],
An efficient print-scanning resilient data hiding scheme based on a
novel LPM,
ICIP08(2080-2083).
IEEE DOI
0810
BibRef
Cheddad, A.[Abbas],
Condell, J.[Joan],
Curran, K.[Kevin],
McKevitt, P.[Paul],
Enhancing Steganography in Digital Images,
CRV08(326-332).
IEEE DOI
0805
BibRef
Navas, K.A.,
Aravind, M.L.,
Sasi Kumar, M.,
A novel quality measure for information hiding in images,
Tensor08(1-5).
IEEE DOI
0806
BibRef
Perez-Gonzalez, F.[Fernando],
Heileman, G.L.[Greg L.],
Abdallah, C.T.[Chaouki T.],
Benford's Law in Image Processing,
ICIP07(I: 405-408).
IEEE DOI
0709
Apply to steganalysis. (Detection)
(Benford: Lists of numbers by digit, the low digits dominate -- leading digit
is most often 1)
BibRef
Gou, H.M.[Hong-Mei],
Wu, M.[Min],
Improving Embedding Payload in Binary Images with 'Super-Pixels',
ICIP07(III: 277-280).
IEEE DOI
0709
BibRef
Chen, C.H.[Chun-Hua],
Shi, Y.Q.[Yun Q.],
Xuan, G.R.[Guo-Rong],
Steganalyzing Texture Images,
ICIP07(II: 153-156).
IEEE DOI
0709
BibRef
Yu, X.Y.[Xiao-Yi],
Zhu, X.S.[Xin-Shan],
Babaguchi, N.[Noboru],
Steganography using Sensor Noise and Linear Prediction Synthesis Filter,
ICIP07(II: 157-160).
IEEE DOI
0709
BibRef
Sarkar, A.,
Manjunath, B.S.,
Estimating Steganographic Capacity for Odd-Even Based Embedding and its
Use in Individual Compensation,
ICIP07(I: 409-412).
IEEE DOI
0709
BibRef
Smith, C.B.[Christopher B.],
Steganalysis using Noise Variance Estimation,
ICIP07(I: 417-420).
IEEE DOI
0709
BibRef
Zou, D.K.[De-Kun],
Tian, J.[Jun],
Bloom, J.A.[Jeffrey A.],
Zhai, J.F.[Jie-Fu],
Data Hiding in Film Grain,
DW06(197-211).
Springer DOI
0611
BibRef
Kim, Y.H.[Youn-Hee],
Duric, Z.[Zoran],
Richards, D.[Dana],
Towards Lower Bounds on Embedding Distortion in Information Hiding,
DW06(362-376).
Springer DOI
0611
BibRef
Marçal, A.R.S.[André R.S.],
Pereira, P.R.[Patricia R.],
A Steganographic Method for Digital Images Robust to RS Steganalysis,
ICIAR05(1192-1199).
Springer DOI
0509
BibRef
Lai, B.L.[Bo-Luen],
Chang, L.W.[Long-Wen],
Adaptive Data Hiding for Images Based on Harr Discrete Wavelet
Transform,
PSIVT06(1085-1093).
Springer DOI
0612
BibRef
Xuan, G.R.[Guo-Rong],
Shi, Y.Q.[Yun Q.],
Huang, C.[Cong],
Fu, D.D.[Dong-Dong],
Zhu, X.M.[Xiu-Ming],
Chai, P.Q.[Pei-Qi],
Gao, J.J.[Jian-Jiong],
Steganalysis Using High-Dimensional Features Derived from Co-occurrence
Matrix and Class-Wise Non-Principal Components Analysis (CNPCA),
DW06(49-60).
Springer DOI
0611
BibRef
Nguyen, B.C.[Bui Cong],
Yoon, S.M.[Sang Moon],
Lee, H.K.[Heung-Kyu],
Multi Bit Plane Image Steganography,
DW06(61-70).
Springer DOI
0611
BibRef
Candan, C.,
A Transcoding Robust Data Hiding Method for Image Communication
Applications,
ICIP05(III: 660-663).
IEEE DOI
0512
BibRef
Whelan, K.M.,
Silvestre, G.C.M.,
Hurley, N.J.,
Iterative Decoding of Scale Invariant Image Data-Hiding,
ICIP05(I: 989-992).
IEEE DOI
0512
BibRef
Yu, X.Y.[Xiao-Yi],
Wang, Y.H.[Yun-Hong],
Tan, T.N.[Tie-Niu],
Model based steganalysis,
ICIP04(IV: 2625-2628).
IEEE DOI
0505
BibRef
Solanki, K.,
Sullivan, K.,
Madhow, U.,
Manjunath, B.S.,
Chandrasekaran, S.,
Statistical Restoration for Robust and Secure Steganography,
ICIP05(II: 1118-1121).
IEEE DOI
0512
BibRef
Wang, X.F.[Xue-Feng],
Yao, Z.[Zhen],
Li, C.T.[Chang-Tsun],
A Palette-Based Image Steganographic Method Using Colour Quantisation,
ICIP05(II: 1090-1093).
IEEE DOI
0512
BibRef
del Rey, A.M.[A. Martín],
Sánchez, G.R.[G. Rodríguez],
de la Villa-Cuenca, A.,
A Protocol to Cipher Digital Images Based on Cat Maps and Cellular
Automata,
IbPRIA07(I: 571-578).
Springer DOI
0706
BibRef
del Rey, A.M.[Angel Martín],
A Matrix-Based Secret Sharing Scheme for Images,
CIARP08(635-642).
Springer DOI
0809
BibRef
And:
A Secret Sharing Scheme for Digital Images Based on Two-Dimensional
Linear Cellular Automata,
IWCIA08(xx-yy).
Springer DOI
0804
BibRef
Marańón, G.Á.[Gonzalo Álvarez],
Encinas, L.H.[Luis Hernández],
del Rey, Á.M.[Ángel Martín],
A New Secret Sharing Scheme for Images Based on Additive 2-Dimensional
Cellular Automata,
IbPRIA05(I:411).
Springer DOI
0509
BibRef
Jiang, M.[Ming],
Wong, E.,
Memon, N.,
Wu, X.L.[Xiao-Lin],
A simple technique for estimating message lengths for additive noise
steganography,
ICARCV04(II: 983-986).
IEEE DOI
0412
BibRef
Sattar, F.,
Yu, D.[Dan],
Razul, S.G.,
Krishnan, S.M.,
Transparent information hiding with automatic embedding range selection
for ownership verification,
ICIP04(IV: 2657-2660).
IEEE DOI
0505
BibRef
Amin, P.,
Subbalakshuni, K.P.,
Rotation and cropping resilient data hiding with zernike moments,
ICIP04(IV: 2175-2178).
IEEE DOI
0505
BibRef
Liu, N.[Ning],
Subbalakshun, K.P.,
Non-uniform quantizer design for image data hiding,
ICIP04(IV: 2179-2182).
IEEE DOI
0505
BibRef
Xue, G.[Gang],
Lu, P.Z.[Pei-Zhong],
Wang, J.L.[Jin-Lian],
A Counter-Geometric Distortions Data Hiding Scheme Using Double
Channels in Color Images,
DW04(42-54).
Springer DOI
0505
BibRef
Yu, J.J.[Jeong Jae],
Jung, C.H.[Chang-Ho],
Yoon, S.K.[Seok-Koo],
Lee, S.J.[Sang-Jin],
Steganographic Scheme Using a Block Cipher,
DW04(163-170).
Springer DOI
0505
BibRef
Chandramouli, R.,
On information hiding with incomplete information about steganalysis,
ICIP04(II: 1161-1164).
IEEE DOI
0505
BibRef
Sullivan, K.,
Bi, Z.,
Madhow, U.,
Chandrosekaran, S.,
Manjunath, B.S.,
Steganalysis of quantization index modulation data hiding,
ICIP04(II: 1165-1168).
IEEE DOI
0505
BibRef
Chae, J.J.,
Mukherjee, D.,
Manjunath, B.S.,
Color image embedding using multidimensional lattice structures,
ICIP98(I: 460-464).
IEEE DOI
9810
BibRef
Gou, H.M.[Hong-Mei],
Wu, M.[Min],
Data hiding in curves for collusion-resistant digital fingerprinting,
ICIP04(I: 51-54).
IEEE DOI
0505
BibRef
Jiang, M.[Ming],
Memon, N.,
Wong, E.,
Wu, X.L.[Xiao-Lin],
Quantitative steganalysis of binary images,
ICIP04(I: 29-32).
IEEE DOI
0505
BibRef
Solanki, K.,
Madhow, U.,
Manjunath, B.S.,
Chandrasekaran, S.,
Estimating and undoing rotation for print-scan resilient data hiding,
ICIP04(I: 39-42).
IEEE DOI
0505
BibRef
Liu, T.H.[Tung-Hsiang],
Chang, L.W.[Long-Wen],
An adaptive data hiding technique for binary images,
ICPR04(IV: 831-834).
IEEE DOI
0409
BibRef
Yu, X.Y.[Xiao-Yi],
Wang, Y.H.[Yun-Hong],
Tan, T.N.[Tie-Niu],
On estimation of secret message length in jsteg-like steganography,
ICPR04(IV: 673-676).
IEEE DOI
0409
BibRef
Yu, X.Y.[Xiao-Yi],
Wang, Y.H.[Yun-Hong],
Tan, T.N.[Tie-Niu],
Steganalysis of data hiding in binary images,
ICPR04(IV: 877-880).
IEEE DOI
0409
BibRef
Yi, Y.[Yu],
Lee, M.H.[Moon Ho],
Kim, J.H.[Ji Hyun],
Hwang, G.Y.[Gi Yean],
Robust Wavelet-Based Information Hiding through Low-Density
Parity-Check (LDPC) Codes,
DW03(117-128).
Springer DOI
0405
BibRef
Sion, R.[Radu],
Atallah, M.[Mikhail],
Prabhakar, S.I.[Sun-Il],
Resilient Information Hiding for Abstract Semi-structures,
DW03(141-153).
Springer DOI
0405
BibRef
Jung, Y.J.[Yong Ju],
Kang, H.K.[Ho Kyung],
Ro, Y.M.[Yong Man],
Metadata Hiding for Content Adaptation,
DW03(435-446).
Springer DOI
0405
BibRef
Yu, J.J.[Jeong Jae],
Han, J.W.[Jae Won],
Lee, K.S.[Kwang Su],
O, S.C.[Seung Cheol],
Lee, S.J.[Sang-Jin],
Park, I.H.[Il Hwan],
A Secure Steganographic Scheme against Statistical Analyses,
DW03(497-507).
Springer DOI
0405
BibRef
Chang, K.[Kisik],
Jung, C.H.[Chang-Ho],
Lee, S.J.[Sang-Jin],
Yang, W.[Wooil],
High Quality Perceptual Steganographic Techniques,
DW03(518-531).
Springer DOI
0405
BibRef
Sallee, P.[Phil],
Model-Based Steganography,
DW03(154-167).
Springer DOI
0405
BibRef
Thomos, N.T.,
Boulgouris, N.V.,
Simitopoulos, D.E.,
Strintzis, M.G.,
List Viterbi Decoding of Convolutional Codes for Efficient Data Hiding,
ICIP02(III: 461-464).
IEEE DOI
0210
BibRef
Pérez-González, F.[Fernando],
The Importance of Aliasing in Structured Quantization Index Modulation
Data Hiding,
DW03(1-17).
Springer DOI
0405
BibRef
Perez-Gonzalez, F.,
Balado, F.,
Quantized projection data hiding,
ICIP02(II: 889-892).
IEEE DOI
0210
BibRef
Farid, H.,
Detecting hidden messages using higher-order statistical models,
ICIP02(II: 905-908).
IEEE DOI
0210
BibRef
Lin, C.Y.,
Chang, S.F.,
Zero-error Information Hiding Capacity of Digital Images,
ICIP01(III: 1007-1010).
IEEE DOI
0108
BibRef
Silvestre, G.,
Embedding Data in Digital Images Using CDMA Techniques,
ICIP00(Vol I: 589-592).
IEEE DOI
0008
BibRef
Masry, M.A.,
Ramos, M.,
Hemami, S.S.,
Robust Data Hiding Using Psychovisual Thresholding,
ICIP00(Vol I: 593-596).
IEEE DOI
0008
BibRef
Ding, W.[Wei],
Yan, W.Q.[Wei-Qi],
Qi, D.X.[Dong-Xu],
A Novel Digital Image Hiding Technology Based on
Tangram and Conway's Game,
ICIP00(Vol I: 601-604).
IEEE DOI
0008
BibRef
Alturki, F.T.[Faisal T.],
Mersereauu, R.M.[Russell M.],
Secure Blind Image Steganographic Technique Using Discrete Fourier
Transformation,
ICIP01(II: 542-545).
IEEE DOI
0108
BibRef
Sehgal, A.,
Jagmohan, A.,
Ahuja, N.,
High Capacity Data Embedding in the Wavelet Domain,
ICIP01(III: 979-982).
IEEE DOI
0108
BibRef
Ramkumar, M.[Mahalingam],
Akansu, A.N.[Ali N.],
Alatan, A.A.[A. Aydin],
A Robust Data Hiding Scheme for Images Using DFT,
ICIP99(II:211-215).
IEEE DOI
BibRef
9900
Fleet, D.J., and
Heeger, D.,
Embedding Invisible Information in Color Images,
ICIP97(I: 532-535).
IEEE DOI
PS File.
BibRef
9700
Hsu, C.T.[Chiou-Ting],
Wu, J.L.[Ja-Ling],
Hidden signatures in images,
ICIP96(III: 223-226).
IEEE DOI
9610
BibRef
Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Data Hiding, Steganography, Random Grids, Random Dots .