25.3.11 Image Hiding, Data Hiding, Steganography, Steganalysis

Chapter Contents (Back)
Steganography. Steganalysis. Data Hiding. Image Hiding. Many of the more specific papers are separated out:
See also Data Hiding, Steganography, Random Grids, Random Dots.
See also Reversible Data Hiding, Steganography.
See also Data Hiding, Steganography, LSB, Least Significant Bit.
See also Data Hiding, Steganography, Pixel Difference.
See also Data Hiding, Steganography, Adversarial Networks, Convolutional Networks, Deep Learning.
See also Halftone Images, Compressed Images: Image Hiding, Data Hiding, Steganography.
See also Video Data Hiding, Data Hiding in Video, Video Steganography.
See also Surveys, Image Hiding, Data Hiding, Steganography.

Xydeag, C.S., Kostic, B., Steele, R.,
Embedding Data into Pictures by Modulo Masking,
Commun(32), 1984, pp. 56-69. BibRef 8400

Lee, I.S.[I-Shi], Tsai, W.H.[Wen-Hsiang],
Data Hiding in Binary Images with Distortion-Minimizing Capabilities by Optimal Block Pattern Coding and Dynamic Programming Techniques,
IEICE(E90-D), No. 8, August 2007, pp. 1142-1150.
DOI Link 0708
BibRef

Lee, I.S.[I-Shi], Tsai, W.H.[Wen-Hsiang],
Data hiding in grayscale images by dynamic programming based on a human visual model,
PR(42), No. 7, July 2009, pp. 1604-1611.
Elsevier DOI 0903
Data hiding; Grayscale image; Human visual system; Block pattern encoding; Dynamic programming BibRef

Lee, Y.K.[Yeuan-Kuen], Chen, L.H.[Ling-Hwei],
High capacity image steganographic model,
VISP(147), No. 3, 2000, pp. 288. 0008
BibRef

Wang, R.Z.[Ran-Zan], Chen, Y.S.[Yeh-Shun],
High-payload image steganography using two-way block matching,
SPLetters(13), No. 3, March 2006, pp. 161-164.
IEEE DOI 0604
BibRef

Wang, R.Z.[Ran-Zan], Su, C.H.[Chin-Hui],
Secret image sharing with smaller shadow images,
PRL(27), No. 6, 15 April 2006, pp. 551-555.
Elsevier DOI Secret sharing; Image sharing; Shadow image; Data hiding 0604
BibRef

Lin, Y.Y.[Yung-Yi], Wang, R.Z.[Ran-Zan],
Scalable Secret Image Sharing With Smaller Shadow Images,
SPLetters(17), No. 1, January 2010, pp. 245-248.
IEEE DOI 1001
BibRef

Wang, R.Z.[Ran-Zan], Chien, Y.F.[Yin-Fang], Lin, Y.Y.[Yung-Yi],
Scalable user-friendly image sharing,
JVCIR(21), No. 7, October 2010, pp. 751-761.
Elsevier DOI 1003
Image sharing; Secret sharing; Secret image sharing; User-friendly shadow image; Progressive reconstruction; Scalable sharing; Visual cryptography; Visual secret sharing BibRef

Fridrich, J.[Jessica], Goljan, M.[Miroslav], Du, R.[Rui],
Lossless Data Embedding: New Paradigm in Digital Watermarking,
JASP(2002), No. 2, 2002, pp. 185-196. 0202
BibRef

Su, W.K.[Wen-Kang], Ni, J.Q.[Jiang-Qun], Hu, X.L.[Xiang-Lei], Fridrich, J.[Jessica],
Image Steganography With Symmetric Embedding Using Gaussian Markov Random Field Model,
CirSysVideo(31), No. 3, March 2021, pp. 1001-1015.
IEEE DOI 2103
Distortion, Markov random fields, Payloads, Random variables, Art, Adaptation models, Integrated circuit modeling, Steganography, minimal distortion embedding BibRef

Tong, Y.C.[Yi-Chen], Ni, J.Q.[Jiang-Qun], Su, W.K.[Wen-Kang],
Image Steganography Using an Eight-element Neighborhood Gaussian Markov Random Field Model,
IWDW19(247-255).
Springer DOI 2003
BibRef

Huang, J.W.[Ji-Wu], Shi, Y.Q.[Yun Q.],
Reliable information bit hiding,
CirSysVideo(12), No. 10, October 2002, pp. 916-920.
IEEE Top Reference. 0212
BibRef

Lu, W.[Wei], Li, R.P.[Rui-Peng], Zeng, L.W.[Ling-Wen], Chen, J.J.[Jun-Jia], Huang, J.W.[Ji-Wu], Shi, Y.Q.[Yun-Qing],
Binary Image Steganalysis Based on Histogram of Structuring Elements,
CirSysVideo(30), No. 9, September 2020, pp. 3081-3094.
IEEE DOI 2009
Markov processes, Histograms, Shape, Image edge detection, Distortion, Gray-scale, Visualization, Binary images, steganalysis, histogram BibRef

Avcibas, I.[Ismail], Memon, N.[Nasir], Sankur, B.[Bülent],
Steganalysis using image quality metrics,
IP(12), No. 2, February 2003, pp. 221-229.
IEEE DOI 0304
BibRef

Kim, H.J.[Hyoung Joong], Choi, Y.H.[Yong Hee],
A novel echo-hiding scheme with backward and forward kernels,
CirSysVideo(13), No. 8, August 2003, pp. 885-889.
IEEE Abstract. 0309
BibRef

Thien, C.C.[Chih-Ching], Lin, J.C.[Ja-Chen],
A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function,
PR(36), No. 12, December 2003, pp. 2875-2881.
Elsevier DOI 0310
BibRef

Thien, C.C.[Chih-Ching], Lin, J.C.[Ja-Chen],
An image-sharing method with user-friendly shadow images,
CirSysVideo(13), No. 12, December 2003, pp. 1161-1169.
IEEE Abstract. 0402
BibRef

Jain, A.K.[Anil K.], Uludag, U.[Umut],
Hiding Biometric Data,
PAMI(25), No. 11, November 2003, pp. 1494-1498.
IEEE Abstract. 0311
Biometrics. How to establish the authenticity of the biometric data itself. Biometric data is not replaceable or secret. Hide the data (eigen face coefficients or fingerprints) itself in images. BibRef

Jain, A.K., Uludag, U., Hsu, R.L.[Rein-Lien],
Hiding a face in a fingerprint image,
ICPR02(III: 756-759).
IEEE DOI 0211
BibRef

Wang, Z.C.[Zi-Chi], Lv, J.P.[Jin-Peng], Wei, Q.D.[Qing-De], Zhang, X.P.[Xin-Peng],
Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding Change,
IWDW16(487-493).
Springer DOI 1703
BibRef

Wu, M.Y.[Mei-Yi], Ho, Y.K.[Yu-Kun], Lee, J.H.[Jia-Hong],
An iterative method of palette-based image steganography,
PRL(25), No. 3, February 2004, pp. 301-309.
Elsevier DOI 0401
BibRef
Earlier:
A Method to Improve the Stego-Image Quality for Palette-Based Image Steganography,
DW03(483-496).
Springer DOI 0405
BibRef

Ho, Y.K.[Yu-Kuen], Wu, M.Y.[Mei-Yi],
Robust object-based watermarking scheme via shape self-similarity segmentation,
PRL(25), No. 15, November 2004, pp. 1673-1680.
Elsevier DOI 0411
BibRef

Yang, C.N.[Ching-Nung],
New visual secret sharing schemes using probabilistic method,
PRL(25), No. 4, March 2004, pp. 481-494.
Elsevier DOI 0402
BibRef

Yang, C.N.[Ching-Nung], Chen, T.S.[Tse-Shih],
Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion,
PRL(26), No. 2, 15 January 2005, pp. 193-206.
Elsevier DOI 0501
BibRef
And:
Extended Visual Secret Sharing Schemes with High-Quality Shadow Images Using Gray Sub Pixels,
ICIAR05(1184-1191).
Springer DOI 0509
BibRef
Earlier:
New Aspect Ratio Invariant Visual Secret Sharing Schemes Using Square Block-Wise Operation,
ICIAR05(1167-1174).
Springer DOI 0509
BibRef

Yang, C.N.[Ching-Nung], Chen, T.S.[Tse-Shih],
Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation,
PR(39), No. 7, July 2006, pp. 1300-1314.
Elsevier DOI 0606
BibRef
And:
Visual Secret Sharing Scheme: Improving the Contrast of a Recovered Image Via Different Pixel Expansions,
ICIAR06(I: 468-479).
Springer DOI 0610
Visual secret sharing; Visual cryptography; Secret image sharing BibRef

Bastug, A., Sankur, B.,
Improving the Payload of Watermarking Channels via LDPC Coding,
SPLetters(11), No. 2, February 2004, pp. 90-92.
IEEE Abstract. 0402
BibRef

Wu, Y.S.[Yu-Shan], Thien, C.C.[Chih-Ching], Lin, J.C.[Ja-Chen],
Sharing and hiding secret images with size constraint,
PR(37), No. 7, July 2004, pp. 1377-1385.
Elsevier DOI 0405
BibRef

Wang, Y.L.[Yu-Lin], Pearmain, A.[Alan],
Blind image data hiding based on self reference,
PRL(25), No. 15, November 2004, pp. 1681-1689.
Elsevier DOI 0411

See also Blind MPEG-2 Video Watermarking Robust Against Geometric Attacks: A Set of Approaches in DCT Domain. BibRef

Solanki, K., Jacobsen, N., Madhow, U., Manjunath, B.S., Chandrasekaran, S.,
Robust image-adaptive data hiding using erasure and error correction,
IP(13), No. 12, December 2004, pp. 1627-1639.
IEEE DOI 0412
BibRef

Sullivan, K., Solanki, K., Manjunath, B.S., Madhow, U., Chandrasekaran, S.,
Determining Achievable Rates for Secure, Zero Divergence, Steganography,
ICIP06(121-124).
IEEE DOI 0610
BibRef
And: A2, A1, A4, A3, A5:
Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration,
ICIP06(125-128).
IEEE DOI 0610
BibRef

Solanki, K., Dabeer, O., Manjunath, B.S., Madhow, U., Chandrasekaran, S.,
A joint source-channel coding scheme for image-in-image data hiding,
ICIP03(II: 743-746).
IEEE Abstract. 0312
BibRef

Brisbane, G., Safavi-Naini, R., Ogunbona, P.,
High-capacity steganography using a shared colour palette,
VISP(152), No. 6, December 2005, pp. 787-792.
DOI Link 0512
BibRef

Alghoniemy, M., Tewfik, A.H.,
Progressive Quantized Projection Approach to Data Hiding,
IP(15), No. 2, February 2006, pp. 459-472.
IEEE DOI 0602

See also Geometric Invariance in image watermarking. BibRef

Lan, T.H., Tewfik, A.H.,
A Novel High-Capacity Data-Embedding System,
IP(15), No. 8, August 2006, pp. 2431-2440.
IEEE DOI 0606
BibRef

Wu, Y.T., Shih, F.Y.,
Genetic Algorithm Based Methodology for Breaking the Steganalytic Systems,
SMC-B(36), No. 1, February 2006, pp. 24-31.
IEEE DOI 0602

See also Enhancement of image watermark retrieval based on genetic algorithms. BibRef

Comesana, P.[Pedro], Perez-Gonzalez, F.[Fernando],
The Impact of the Cropping Attack on Scalar STDM Data Hiding,
SPLetters(13), No. 6, June 2006, pp. 353-356.
IEEE DOI 0606
BibRef

Meinecke, F.C.[Frank C.], Harmeling, S.[Stefan], Müller, K.R.[Klaus-Robert],
Inlier-based ICA with an application to superimposed images,
IJIST(15), No. 1, 2005, pp. 48-55.
DOI Link 0507
BibRef

Meinecke, F.C.[Frank C.], von Bunau, P.[Paul], Kawanabe, M.[Motoaki], Muller, K.R.[Klaus-R.],
Learning invariances with Stationary Subspace Analysis,
Subspace09(87-92).
IEEE DOI 0910
BibRef

Shie, S.C.[Shih-Chieh], Jiang, J.H.[Ji-Han], Chen, L.T.[Long-Tai], Huang, Z.H.[Zeng-Hui],
Secret Image Transmission Scheme Using Secret Codebook,
IEICE(E93-D), No. 2, February 2010, pp. 399-402.
WWW Link. 1002
BibRef

Feng, J.B.[Jen-Bang], Wu, H.C.[Hsien-Chu], Tsai, C.S.[Chwei-Shyong], Chang, Y.F.[Ya-Fen], Chu, Y.P.[Yen-Ping],
Visual secret sharing for multiple secrets,
PR(41), No. 12, December 2008, pp. 3572-3581.
Elsevier DOI 0810
Visual cryptography; Visual secret sharing; Multiple secret sharing; Visual pattern BibRef

Zhang, X.P.[Xiao-Ping], Li, K.[Kan], Wang, X.F.[Xiao-Feng],
A Novel Look-Up Table Design Method for Data Hiding With Reduced Distortion,
CirSysVideo(18), No. 6, June 2008, pp. 769-776.
IEEE DOI 0711
BibRef

Li, B., Fang, Y., Huang, J.,
Steganalysis of Multiple-Base Notational System Steganography,
SPLetters(15), No. 1, 2008, pp. 493-496.
IEEE DOI 0806
BibRef

Gang, L.T.[Li-Tao], Akansu, A.N.[Ali N.],
Cover Noise Interference Suppression In Multimedia Data Hiding,
IJIG(5), No. 1, January 2005, pp. 191-207. 0501
BibRef

Sallee, P.[Phil],
Model-based Methods For Steganography And Steganalysis,
IJIG(5), No. 1, January 2005, pp. 167-189. 0501
BibRef

Chang, C.C.[Chin-Chen], Hsieh, Y.P.[Yi-Pei], Lin, C.H.[Chia-Hsuan],
Sharing secrets in stego images with authentication,
PR(41), No. 10, October 2008, pp. 3130-3137.
Elsevier DOI 0808
Steganography; Authentication; Secret image sharing; (k,n) Threshold
See also comment on Sharing secrets in stego images with authentication, A. BibRef

Chang, C.C.[Chin-Chen], Hsieh, Y.P.[Yi-Pei],
Authors reply 'Sharing secrets in stego images with authentication',
PR(42), No. 7, July 2009, pp. 1620-1621.
Elsevier DOI 0903

See also comment on Sharing secrets in stego images with authentication, A. BibRef

Lin, J.[Juan], Horng, J.H.[Ji-Hwei], Liu, Y.J.[Yan-Jun], Chang, C.C.[Chin-Chen],
An anisotropic reference matrix for image steganography,
JVCIR(74), 2021, pp. 102969.
Elsevier DOI 2101
Anisotropic reference matrix, Data hiding, Steganography, Visual quality, Embedding capacity BibRef

Lee, C.F.[Chin-Feng], Chang, C.C.[Chin-Chen], Wang, K.H.[Kuo-Hua],
An improvement of EMD embedding method for large payloads by pixel segmentation strategy,
IVC(26), No. 12, 1 December 2008, pp. 1670-1676.
Elsevier DOI 0810
Covert communication; Digit steganography; Data hiding; Embedding capacity EMD: Empirical mode decomposition BibRef

Lee, C.F.[Chin-Feng], Chen, H.L.[Hsing-Ling], Lai, S.H.[Shu-Hua],
An adaptive data hiding scheme with high embedding capacity and visual image quality based on SMVQ prediction through classification codebooks,
IVC(28), No. 8, August 2010, pp. 1293-1302.
Elsevier DOI 1006
Data hiding; Image quality of stego-image; Embedding capacity; Side-match vector quantization; SMVQ prediction BibRef

Yang, C.N.[Ching-Nung], Ciou, C.B.[Chuei-Bang],
A comment on 'Sharing secrets in stego images with authentication',
PR(42), No. 7, July 2009, pp. 1615-1619.
Elsevier DOI 0903
Secret sharing; Image secret sharing; Steganography; Authentication
See also Sharing secrets in stego images with authentication. BibRef

Yang, C.N.[Ching-Nung], Ciou, C.B.[Chuei-Bang],
Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability,
IVC(28), No. 12, December 2010, pp. 1600-1610.
Elsevier DOI 1003
Image secret sharing; Visual cryptography; Polynomial-based secret sharing; Lagrange interpolation BibRef

Li, P.[Peng], Ma, P.J.[Pei-Jun], Su, X.H.[Xiao-Hong], Yang, C.N.[Ching-Nung],
Improvements of a two-in-one image secret sharing scheme based on gray mixing model,
JVCIR(23), No. 3, April 2012, pp. 441-453.
Elsevier DOI 1203
Image secret sharing; Visual cryptography; Polynomial-based secret sharing; Gray mixing model; Information hiding; Lagrange interpolation; (k,n)-threshold scheme; Image processing BibRef

Li, P.[Peng], Yang, C.N.[Ching-Nung], Kong, Q.[Qian],
A Novel Two-in-One Image Secret Sharing Scheme Based on Perfect Black Visual Cryptography,
RealTimeIP(14), No. 1, January 2018, pp. 41-50.
WWW Link. 1802
BibRef
Earlier:
Two-in-One Image Secret Sharing Scheme Based on Boolean Operations,
IWDW14(305-318).
Springer DOI 1602
BibRef

Liu, N., Amin, P., Subbalakshmi, K.P.,
Security and Robustness Enhancement for Image Data Hiding,
MultMed(9), No. 3, April 2007, pp. 466-474.
IEEE DOI 0905
BibRef

Amin, P.[Palak], Subbalakshmi, K.P.,
Detecting Hidden Messages Using Image Power Spectrum,
ICIP07(I: 421-424).
IEEE DOI 0709
BibRef

Eslami, Z., Razzaghi, S.H., Ahmadabadi, J.Z.[J. Zarepour],
Secret image sharing based on cellular automata and steganography,
PR(43), No. 1, January 2010, pp. 397-404.
Elsevier DOI 0909
Secret sharing scheme; Linear memory cellular automata; Digital signature; Authentication; Verifiability BibRef

Sheidani, S.[Sorour], Eslami, Z.[Ziba],
Blind multipurpose watermarking with insertion of a single watermark: A generic construction based on verifiable threshold secret sharing,
IET-IPR(14), No. 17, 24 December 2020, pp. 4766-4773.
DOI Link 2104
BibRef

Cheng, Y.M.[Yu-Ming], Wang, C.M.[Chung-Ming],
A Novel Approach to Steganography in High- Dynamic-Range Images,
MultMedMag(16), No. 3, July-September 2009, pp. 70-80.
IEEE DOI 0909
BibRef

Lin, Y.T.[Yun-Te], Wang, C.M.[Chung-Ming], Chen, W.S.[Wei-Sung], Lin, F.P.[Fang-Pang], Lin, W.[Woei],
A Novel Data Hiding Algorithm for High Dynamic Range Images,
MultMed(19), No. 1, January 2017, pp. 196-211.
IEEE DOI 1612
Distortion BibRef

Zeng, X.T.[Xian-Ting], Ping, L.D.[Ling-Di], Pan, X.Z.[Xue-Zeng],
A lossless robust data hiding scheme,
PR(43), No. 4, April 2010, pp. 1656-1667.
Elsevier DOI 1002
Lossless data hiding; Watermarking; Steganography; Image processing; Robust lossless data hiding; Semi-fragile authentication BibRef

Kalantari, N.K., Ahadi, S.M.,
A Logarithmic Quantization Index Modulation for Perceptually Better Data Hiding,
IP(19), No. 6, June 2010, pp. 1504-1517.
IEEE DOI 1006
BibRef

Lin, G.S.[Guo-Shiang], Chang, Y.T., Lie, W.N.[Won-Nuiig],
A Framework of Enhancing Image Steganography With Picture Quality Optimization and Anti-Steganalysis Based on Simulated Annealing Algorithm,
MultMed(12), No. 5, 2010, pp. 345-357.
IEEE DOI 1008
BibRef

Chuang, C.H.[Cheng-Hung], Lin, G.S.[Guo-Shiang],
An Optical Video Cryptosystem with Adaptive Steganography,
MVA09(439-).
PDF File. 0905
BibRef

Hou, C.L., Lu, C., Tsai, S.C., Tzeng, W.G.,
An Optimal Data Hiding Scheme With Tree-Based Parity Check,
IP(20), No. 3, March 2011, pp. 880-886.
IEEE DOI 1103
BibRef

Gao, X., An, L., Yuan, Y., Tao, D., Li, X.,
Lossless Data Embedding Using Generalized Statistical Quantity Histogram,
CirSysVideo(21), No. 8, August 2011, pp. 1061-1070.
IEEE DOI 1108
BibRef

Guo, C.[Cheng], Chang, C.C.[Chin-Chen], Qin, C.[Chuan],
A hierarchical threshold secret image sharing,
PRL(33), No. 1, 1 January 2012, pp. 83-91.
Elsevier DOI 1112
Hierarchical threshold; Distortion-free; Secret image sharing; Access structure BibRef

Guo, C.[Cheng], Chang, C.C.[Chin-Chen], Qin, C.[Chuan],
A multi-threshold secret image sharing scheme based on MSP,
PRL(33), No. 12, 1 September 2012, pp. 1594-1600.
Elsevier DOI 1208
Multi-threshold secret sharing; Access structure; Secret image sharing; Monotone span programs BibRef

Li, F.Y.[Feng-Yong], Sheng, Y.[Yang], Zhang, X.P.[Xin-Peng], Qin, C.[Chuan],
iSCMIS:Spatial-Channel Attention Based Deep Invertible Network for Multi-Image Steganography,
MultMed(26), 2024, pp. 3137-3152.
IEEE DOI 2402
Steganography, Distortion, Neural networks, Couplings, Security, Visualization, Additives, Attention mechanism, high-capacity, visual quality BibRef

Yu, J.[Jiang], Li, F.Y.[Feng-Yong], Wang, Z.C.[Zi-Chi], Si, W.[Wen], Zhang, X.P.[Xin-Peng],
Diverse Batch Steganography Using Model-Based Selection and Double-Layered Payload Assignment,
CirSysVideo(34), No. 8, August 2024, pp. 7785-7800.
IEEE DOI 2408
Distortion, Payloads, Steganography, Security, Resource management, Integrated circuit modeling, Gaussian distribution, Kullback-Leibler (KL) divergence BibRef

Yang, C.N.[Ching-Nung], Wu, C.C.[Chih-Cheng], Lin, Y.C.[Yi-Chin], Kim, C.[Cheonshik],
Enhanced Matrix-Based Secret Image Sharing Scheme,
SPLetters(19), No. 12, December 2012, pp. 789-792.
IEEE DOI 1212
BibRef

Varsaki, E.E.[Eleni E.], Fotopoulos, V.[Vassilis], Skodras, A.N.[Athanassios N.],
Data hiding based on image texture classification,
SIViP(7), No. 2, March 2013, pp. 247-253.
WWW Link. 1303
BibRef

Elshoura, S.M., Megherbi, D.B.,
A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments,
SP:IC(28), No. 5, May 2013, pp. 531-552.
Elsevier DOI 1305
Information hiding; Image processing; Steganography; Multi-media computing; Secret communication; Image watermarking; Secret information content verification and authentication; Tchebichef moments BibRef

Elshoura, S.M., Megherbi, D.B.,
Analysis of noise sensitivity of Tchebichef and Zernike moments with application to image watermarking,
JVCIR(24), No. 5, July 2013, pp. 567-578.
Elsevier DOI 1306
Sensitivity; Noise sensitivity; Tchebichef moments; Zernike moments; Image watermarking; Tampering detection; Image reconstruction; Error measurement BibRef

Li, P.[Peng], Ma, J.F.[Jian-Feng], Ma, Q.[Quan],
(t, k, n) XOR-based visual cryptography scheme with essential shadows,
JVCIR(72), 2020, pp. 102911.
Elsevier DOI 2010
XOR operation, Essential participants, Visual cryptography, Secret image sharing BibRef

Li, P.[Peng], Yang, C.N.[Ching-Nung], Wu, C.C.[Chih-Cheng], Kong, Q.[Qian], Ma, Y.P.[Yan-Peng],
Essential secret image sharing scheme with different importance of shadows,
JVCIR(24), No. 7, 2013, pp. 1106-1114.
Elsevier DOI 1309
Secret sharing BibRef

Li, P.[Peng], Liu, Z.Q.[Zu-Quan], Yang, C.N.[Ching-Nung],
A construction method of (t,k,n)-essential secret image sharing scheme,
SP:IC(65), 2018, pp. 210-220.
Elsevier DOI 1805
BibRef
Earlier: A1, A2, Only:
A Novel Visual Cryptography Scheme with Different Importance of Shadows,
IWDW17(365-377).
Springer DOI 1708
Secret image sharing, Secret sharing, Essential shadows, Lagrange interpolation. BibRef

Li, P.[Peng], Yin, L.P.[Li-Ping], Ma, J.F.[Jian-Feng], Wang, H.T.[Hong-Tao],
XOR-based visual cryptography scheme with essential shadows,
JVCIR(85), 2022, pp. 103513.
Elsevier DOI 2205
XOR operation, Essential shadows, Visual cryptography, Secret image sharing, Shadow image, Access structure partition BibRef

Liu, Y.X.[Yan-Xiao], Yang, C.N.[Ching-Nung],
Scalable secret image sharing scheme with essential shadows,
SP:IC(58), No. 1, 2017, pp. 49-55.
Elsevier DOI 1710
Secret image sharing BibRef

Liu, Y.X.[Yan-Xiao], Yang, C.N.[Ching-Nung], Chou, Y.S.[Yung-Shun], Wu, S.Y.[Song-Yu], Sun, Q.D.[Qin-Dong],
Progressive (k,n) secret image sharing Scheme with meaningful shadow images by GEMD and RGEMD,
JVCIR(55), 2018, pp. 766-777.
Elsevier DOI 1809
Progressive secret sharing scheme, Meaningful shadow image, GEMD, RGEMD BibRef

Yang, C.N.[Ching-Nung], Li, P.[Peng], Wu, C.C.[Chih-Cheng], Cai, S.R.[Song-Ruei],
Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach,
SP:IC(31), No. 1, 2015, pp. 1-9.
Elsevier DOI 1502
Secret sharing BibRef

Mohd, B.J.[Bassam Jamil], Abed, S.[Sa'ed], Na'ami, B.[Bassam], Hayajneh, T.[Thaier],
Hierarchical steganography using novel optimum quantization technique,
SIViP(7), No. 6, November 2013, pp. 1029-1040.
Springer DOI 1310
BibRef

Liu, L.[Li], Wang, A.H.[An-Hong], Chang, C.C.[Chin-Chen], Li, Z.H.[Zhi-Hong],
A novel real-time and progressive secret image sharing with flexible shadows based on compressive sensing,
SP:IC(29), No. 1, 2014, pp. 128-134.
Elsevier DOI 1402
Compressed sensing BibRef

Nilizadeh, A., Mazurczyk, W., Zou, C., Leavens, G.T.,
Information Hiding in RGB Images Using an Improved Matrix Pattern Approach,
PRIV17(1407-1415)
IEEE DOI 1709
Computer science, Frequency-domain analysis, Keyboards, Media, Receivers, Security BibRef

Hou, X.D.[Xiao-Dan], Zhang, T.[Tao], Xiong, G.[Gang], Lu, Z.B.[Zhi-Bo], Xie, K.[Kai],
A novel steganalysis framework of heterogeneous images based on GMM clustering,
SP:IC(29), No. 3, 2014, pp. 385-399.
Elsevier DOI 1403
Steganalysis BibRef

Lee, Y.W.[Young-Woon], Heo, J.P.[Jae-Pil], Yoon, S.E.[Sung-Eui],
Quadra-Embedding: Binary Code Embedding with Low Quantization Error,
CVIU(125), No. 1, 2014, pp. 214-222.
Elsevier DOI 1406
BibRef
Earlier: ACCV12(II:214-227).
Springer DOI 1304
Large-scale image retrieval BibRef

Heo, J.P.[Jae-Pil], Lin, Z.[Zhe], Yoon, S.E.[Sung-Eui],
Distance Encoded Product Quantization,
CVPR14(2139-2146)
IEEE DOI 1409
Large-scale search; binary code; image retrieval BibRef

Pakniat, N.[Nasrollah], Noroozi, M.[Mahnaz], Eslami, Z.[Ziba],
Secret image sharing scheme with hierarchical threshold access structure,
JVCIR(25), No. 5, 2014, pp. 1093-1101.
Elsevier DOI 1406
Cryptography BibRef

Li, L.X.[Ling-Xiang], Chen, Z.[Zhi], Fang, J.[Jun],
On Secrecy Capacity of Gaussian Wiretap Channel Aided by A Cooperative Jammer,
SPLetters(21), No. 11, November 2014, pp. 1356-1360.
IEEE DOI 1408
Gaussian channels BibRef

Lin, P.Y.[Pei-Yu], Hsieh, W.F.[Wei-Fan],
Media pattern exhibition mechanism via mobile devices,
JVCIR(25), No. 8, 2014, pp. 1856-1864.
Elsevier DOI 1411
Histogram. conceal pattern. BibRef

Tseng, H.W.[Hsien-Wen], Leng, H.S.[Hui-Shih],
High-payload block-based data hiding scheme using hybrid edge detector with minimal distortion,
IET-IPR(8), No. 11, 2014, pp. 647-654.
DOI Link 1412
data encapsulation BibRef

Feng, B.W.[Bing-Wen], Lu, W.[Wei], Sun, W.[Wei],
Binary image steganalysis based on pixel mesh Markov transition matrix,
JVCIR(26), No. 1, 2015, pp. 284-295.
Elsevier DOI 1502
Binary image BibRef

Lu, W.[Wei], He, L.Y.[Li-Yu], Yeung, Y.L.[Yui-Leong], Xue, Y.J.[Ying-Jie], Liu, H.M.[Hong-Mei], Feng, B.W.[Bing-Wen],
Secure Binary Image Steganography Based on Fused Distortion Measurement,
CirSysVideo(29), No. 6, June 2019, pp. 1608-1618.
IEEE DOI 1906
Distortion, Distortion measurement, Visualization, Security, Frequency division multiplexing, Image quality, flipping position optimization BibRef

Dixit, P.[Pushkar], Singh, N.[Nishant], Gupta, J.P.[Jay Prakash], Agrawal, D.D.[Dev Drume], Kumar, V.[Vinay],
A robust semi fragile lossless image data hiding approach,
IJCVR(5), No. 1, 2015, pp. 1-22.
DOI Link 1502
BibRef

Zhang, J.H.[Jun-Hong], Lu, W.[Wei], Yin, X.L.[Xiao-Lin], Liu, W.T.[Wan-Teng], Yeung, Y.L.[Yui-Leong],
Binary image steganography based on joint distortion measurement,
JVCIR(58), 2019, pp. 600-605.
Elsevier DOI 1901
Binary image steganography, Distortion measurement, Local texture pattern BibRef

Liu, W.T.[Wan-Teng], Yin, X.L.[Xiao-Lin], Lu, W.[Wei], Zhang, J.H.[Jun-Hong],
Halftone Image Steganography with Distortion Measurement Based on Structural Similarity,
IWDW19(281-292).
Springer DOI 2003
BibRef

Yeung, Y.L.[Yui-Leong], Lu, W.[Wei], Xue, Y.J.[Ying-Jie], Huang, J.[Jiwu], Shi, Y.Q.[Yun-Qing],
Secure Binary Image Steganography With Distortion Measurement Based on Prediction,
CirSysVideo(30), No. 5, May 2020, pp. 1423-1434.
IEEE DOI 2005
Distortion, Distortion measurement, Uncertainty, Predictive models, Visual perception, Media, Binary image steganography, syndrome-trellis code (STC) BibRef

Yan, X.[Xuehu], Wang, S.[Shen], El-Latif, A.A.A.[Ahmed A. Abd], Niu, X.[Xiamu],
New approaches for efficient information hiding-based secret image sharing schemes,
SIViP(9), No. 3, March 2015, pp. 499-510.
Springer DOI 1503
BibRef

Yan, X.[Xuehu], Lu, Y.L.[Yu-Liang], Liu, L.T.[Lin-Tao], Wang, S.[Shen],
Partial secret image sharing for (k,n) threshold based on image inpainting,
JVCIR(50), 2018, pp. 135-144.
Elsevier DOI 1802
Secret image sharing, Partial secret image sharing, Image inpainting, Linear congruence, Color image, Lossless recovery BibRef

Liu, L.T.[Lin-Tao], Lu, Y.L.[Yu-Liang], Yan, X.[Xuehu],
A novel (k1,k2,n)-threshold two-in-one secret image sharing scheme for multiple secrets,
JVCIR(74), 2021, pp. 102971.
Elsevier DOI 2101
Ideal secret sharing, RGVCS, Polynomial-based SISS, TiOSISS, Multiple secrets, threshold BibRef

Ou, D.H.[Duan-Hao], Ye, L.[Lili], Sun, W.[Wei],
User-friendly secret image sharing scheme with verification ability based on block truncation coding and error diffusion,
JVCIR(29), No. 1, 2015, pp. 46-60.
Elsevier DOI 1504
Secret image sharing BibRef

Yin, Z.X.[Zhao-Xia], Chang, C.C.[Chin-Chen], Xu, Q.[Qin], Luo, B.[Bin],
Second-order steganographic method based on adaptive reference matrix,
IET-IPR(9), No. 4, 2015, pp. 300-305.
DOI Link 1505
image matching BibRef

Mao, Q., Bharanitharan, K., Chang, C.,
Multi-round dynamic swap optimisation for table-based steganography,
IET-IPR(9), No. 12, 2015, pp. 1073-1082.
DOI Link 1512
cryptography BibRef

Akhavan, S.[Saeed], Akhaee, M.A.[Mohammad Ali], Sarreshtedari, S.[Saeed],
Images steganalysis using GARCH model for feature selection,
SP:IC(39, Part A), No. 1, 2015, pp. 75-83.
Elsevier DOI 1512
Steganalysis BibRef

Hou, Y.C.[Young-Chang], Quan, Z.Y.[Zen-Yu], Tsai, C.F.[Chih-Fong],
A privilege-based visual secret sharing model,
JVCIR(33), No. 1, 2015, pp. 358-367.
Elsevier DOI 1512
Visual secret sharing BibRef

Tang, W.X.[Wei-Xuan], Li, B.[Bin], Luo, W.Q.[Wei-Qi], Huang, J.W.[Ji-Wu],
Clustering Steganographic Modification Directions for Color Components,
SPLetters(23), No. 2, February 2016, pp. 197-201.
IEEE DOI 1602
image color analysis. Color causes issues vs. gray-scale. BibRef

Srividhya, S., Sathishkumar, R., Sudha, G.F.[Gnanou Florence],
Implementation of TiOISSS with meaningful shadows and with an additional authentication image,
JVCIR(38), No. 1, 2016, pp. 284-296.
Elsevier DOI 1605
Two in One Image Secret Sharing Scheme. Visual cryptography BibRef

Sridhar, S.[Srividhya], Sudha, G.F.[Gnanou Florence],
Two in One Image Secret Sharing Scheme (TiOISSS) for extended progressive visual cryptography using simple modular arithmetic operations,
JVCIR(74), 2021, pp. 102996.
Elsevier DOI 2101
Visual Cryptography, Progressive, Polynomial, Meaningful shares and Modular Arithmetic BibRef

Yu, J., Li, F., Cheng, H., Zhang, X.,
Spatial Steganalysis Using Contrast of Residuals,
SPLetters(23), No. 7, July 2016, pp. 989-992.
IEEE DOI 1608
feature extraction BibRef

Kamal, A.H.M., Islam, M.M.[Mohammad Mahfuzul],
Boosting up the data hiding rate through multi cycle embedment process,
JVCIR(40, Part B), No. 1, 2016, pp. 574-588.
Elsevier DOI 1610
Data hiding BibRef

Hou, X.D.[Xiao-Dan], Zhang, T.[Tao], Xu, C.[Chen],
New framework for unsupervised universal steganalysis via SRISP-aided outlier detection,
SP:IC(47), No. 1, 2016, pp. 72-85.
Elsevier DOI 1610
Steganalysis BibRef

Meghrajani, Y.K., Mazumdar, H.S.,
Universal Share for Multisecret Image Sharing Scheme Based on Boolean Operation,
SPLetters(23), No. 10, October 2016, pp. 1429-1433.
IEEE DOI 1610
Boolean algebra BibRef

Kazemi, R., Perez-Gonzalez, F., Akhaee, M.A., Behnia, F.,
Data Hiding Robust to Mobile Communication Vocoders,
MultMed(18), No. 12, December 2016, pp. 2345-2357.
IEEE DOI 1612
Codecs
See also Robust image watermarking using dihedral angle based on maximum-likelihood detector. BibRef

Mohammadi, F.G.[F. Ghareh], Sajedi, H.,
Region based Image Steganalysis using Artificial Bee Colony,
JVCIR(44), No. 1, 2017, pp. 214-226.
Elsevier DOI 1703
Image steganalysis BibRef

Cao, B.[Bing], Feng, G.R.[Guo-Rui], Yin, Z.X.[Zhao-Xia], Fan, L.Y.[Ling-Yan],
Unsupervised Image Steganalysis Method Using Self-Learning Ensemble Discriminant Clustering,
IEICE(E100-D), No. 5, May 2017, pp. 1144-1147.
WWW Link. 1705
BibRef

Feng, B.W.[Bing-Wen], Weng, J.[Jian], Lu, W.[Wei], Pei, B.[Bei],
Steganalysis of content-adaptive binary image data hiding,
JVCIR(46), No. 1, 2017, pp. 119-127.
Elsevier DOI 1706
Binary, image BibRef

Yang, T.Y.[Ting-Ya], Chen, H.S.[Hou-Shou],
Matrix embedding in steganography with binary Reed-Muller codes,
IET-IPR(11), No. 7, July 2017, pp. 522-529.
DOI Link 1707
BibRef

Liao, X.[Xin], Qin, Z.[Zheng], Ding, L.P.[Li-Ping],
Data embedding in digital images using critical functions,
SP:IC(58), No. 1, 2017, pp. 146-156.
Elsevier DOI 1710
Image steganography BibRef

Yang, J.X.[Jun-Xue], Liao, X.[Xin],
An embedding strategy on fusing multiple image features for data hiding in multiple images,
JVCIR(71), 2020, pp. 102822.
Elsevier DOI 2009
Multiple images steganography, Embedding strategy, Multiple image features, Image complexity, Steganographic capacity BibRef

Liao, X.[Xin], Yu, Y.B.[Ying-Bo], Li, B.[Bin], Li, Z.P.[Zhong-Peng], Qin, Z.[Zheng],
A New Payload Partition Strategy in Color Image Steganography,
CirSysVideo(30), No. 3, March 2020, pp. 685-696.
IEEE DOI 2003
Color, Payloads, Distortion, Image color analysis, Security, Correlation, Gray-scale, Image steganography, RGB channels, modification probabilities BibRef

Bhattacharjee, T.[Tapasi], Maity, S.P.[Santi P.], Islam, S.R.[Sheikh Rafiul],
Hierarchical secret image sharing scheme in compressed sensing,
SP:IC(61), No. 1, 2018, pp. 21-32.
Elsevier DOI 1801
Secret image sharing BibRef

Wan, S.[Song], Lu, Y.L.[Yu-Liang], Yan, X.H.[Xue-Hu], Wang, Y.J.[Yong-Jie], Chang, C.[Chao],
Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions,
RealTimeIP(14), No. 1, January 2018, pp. 25-40.
Springer DOI 1802
BibRef

Chen, J.[Jia], Wang, Y.J.[Yong-Jie], Yan, X.[Xuehu], baaa Wang, J.[Jiayu], Li, L.L.[Long-Long],
Visual secret sharing scheme with (n,n) threshold based on WeChat Mini Program codes,
JVCIR(82), 2022, pp. 103409.
Elsevier DOI 2201
Visual secret sharing, WeChat Mini Program codes, Error correction, Access control BibRef

Xia, C.[Chao], Guan, Q.X.[Qing-Xiao], Zhao, X.F.[Xian-Feng], Zhao, C.D.[Cheng-Duo],
Highly accurate real-time image steganalysis based on GPU,
RealTimeIP(14), No. 1, January 2018, pp. 223-236.
Springer DOI 1802
BibRef

Liu, X.[Xin], Wang, S.[Shen], Sang, J.Z.[Jian-Zhi], Zhang, W.Z.[Wei-Zhe],
A novel mapping-based lossless recovery algorithm for VSS,
RealTimeIP(14), No. 1, January 2018, pp. 51-60.
Springer DOI 1802
Visual Secret Sharing (VSS). BibRef

Atta, R.[Randa], Ghanbari, M.[Mohammad],
A high payload steganography mechanism based on wavelet packet transformation and neutrosophic set,
JVCIR(53), 2018, pp. 42-54.
Elsevier DOI 1805
Image steganography, Wavelet packet transformation, Neutrosophic set, Edge detection BibRef

Sharma, V.K.[Vijay Kumar], Srivastava, D.K.[Devesh Kumar], Mathur, P.[Pratistha],
Efficient image steganography using graph signal processing,
IET-IPR(12), No. 6, June 2018, pp. 1065-1071.
DOI Link 1805
BibRef

Wu, X.T.[Xiao-Tian], Yang, C.N.[Ching-Nung], Zhuang, Y.T.[Yi Ting], Hsu, S.C.[Shen-Chieh],
Improving recovered image quality in secret image sharing by simple modular arithmetic,
SP:IC(66), 2018, pp. 42-49.
Elsevier DOI 1806
Secret image sharing, Visual quality, Polynomial, Modular, Finite field, Distortion BibRef

Yang, C.N.[Ching-Nung], Wu, X.T.[Xiao-Tian], Chung, M.J.[Min-Jung], Zhang, X.L.[Xu-Liang],
AMBTC-based secret image sharing by simple modular arithmetic,
JVCIR(84), 2022, pp. 103482.
Elsevier DOI 2204
Secret image sharing, Secret sharing, Simple modular arithmetic, AMBTC, Distortion-free BibRef

Liu, Y.X.[Yan-Xiao], Yang, C.N.[Ching-Nung], Wu, S.Y.[Song-Yu], Chou, Y.S.[Yung-Shun],
Progressive (k,n) secret image sharing schemes based on Boolean operations and covering codes,
SP:IC(66), 2018, pp. 77-86.
Elsevier DOI 1806
Progressive secret image sharing, Boolean operation, Hamming code, Covering function BibRef

Chen, J.L.[Jia-Liang], Lu, W.[Wei], Fang, Y.M.[Yan-Mei], Liu, X.J.[Xian-Jin], Yeung, Y.L.[Yui-Leong], Xue, Y.J.[Ying-Jie],
Binary image steganalysis based on local texture pattern,
JVCIR(55), 2018, pp. 149-156.
Elsevier DOI 1809
Binary image steganalysis, Local texture pattern, Manhattan distance, Ensemble classifier BibRef

Hu, D.H.[Dong-Hui], Xu, H.Y.[Hai-Yan], Ma, Z.J.[Zhong-Jin], Zheng, S.L.[Shu-Li], Li, B.[Bin],
A Spatial Image Steganography Method Based on Nonnegative Matrix Factorization,
SPLetters(25), No. 9, September 2018, pp. 1364-1368.
IEEE DOI 1809
image coding, matrix decomposition, steganography, spatial image steganography method, pixelwise mutual prediction BibRef

Ge, H.[Hui], Hu, D.H.[Dong-Hui], Xu, H.Y.[Hai-Yan], Li, M.[Meng], Zheng, S.L.[Shu-Li],
New Steganalytic Features for Spatial Image Steganography Based on Non-negative Matrix Factorization,
IWDW19(337-351).
Springer DOI 2003
BibRef

Wang, Z., Zhang, X., Yin, Z.,
Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization,
SPLetters(25), No. 10, October 2018, pp. 1530-1534.
IEEE DOI 1810
Distortion, Payloads, Optimization, Mathematical model, Optical fibers, Security, Communication channels, Cover-selection, steganography BibRef

Kanso, A., Ghebleh, M.,
An efficient lossless secret sharing scheme for medical images,
JVCIR(56), 2018, pp. 245-255.
Elsevier DOI 1811
Secret sharing, Secret image sharing, -threshold scheme, Chaos BibRef

Kabirirad, S.[Saeideh], Eslami, Z.[Ziba],
A (t,n)-multi secret image sharing scheme based on Boolean operations,
JVCIR(57), 2018, pp. 39-47.
Elsevier DOI 1812
-secret image sharing scheme, Multi-secret image sharing, Boolean operations, Security BibRef

Yan, X.[Xuehu], Lu, Y.L.[Yu-Liang], Liu, L.[Lintao],
A general progressive secret image sharing construction method,
SP:IC(71), 2019, pp. 66-75.
Elsevier DOI 1901
Secret image sharing, Progressive secret image sharing, Polynomial-based secret image sharing, Visual cryptography, Linear congruence BibRef

Huang, C.T.[Cheng-Ta], Lin, L.C.[Li-Chiun], Yang, C.H.[Cheng-Hsing], Wang, S.J.[Shiuh-Jeng],
Dynamic embedding strategy of VQ-based information hiding approach,
JVCIR(59), 2019, pp. 14-32.
Elsevier DOI 1903
Vector quantization, Dynamic embedding algorithm, Steganography BibRef

Ahmadian, A.M.[Amir M.], Amirmazlaghani, M.[Maryam],
A novel secret image sharing with steganography scheme utilizing Optimal Asymmetric Encryption Padding and Information Dispersal Algorithms,
SP:IC(74), 2019, pp. 78-88.
Elsevier DOI 1904
Secret sharing, Steganography, Image sharing BibRef

Guo, Y.[Yue], Zhang, W.M.[Wei-Ming], Hou, D.D.[Dong-Dong], Yao, Y.Z.[Yuan-Zhi], Ge, S.K.[Shuang-Kui],
A fast coding method for distortion-free data hiding in high dynamic range image,
RealTimeIP(16), No. 3, June 2019, pp. 611-622.
Springer DOI 1906
BibRef

Yang, C.N.[Ching-Nung], Chou, Y.S.[Yung-Shun], Liu, Y.X.[Yan-Xiao], Kim, C.[Cheonshik],
Exploiting error control in matrix coding-based data hiding over lossy channel,
RealTimeIP(16), No. 3, June 2019, pp. 577-588.
Springer DOI 1906
BibRef

Zhang, H.[Hua], Hu, L.[Liting],
A data hiding scheme based on multidirectional line encoding and integer wavelet transform,
SP:IC(78), 2019, pp. 331-344.
Elsevier DOI 1909
Data hiding, Multidirectional line encoding(MDLE), Integer wavelet transform(IWT), Embedding capacity, Imperceptibility BibRef

Liu, Y.X.[Yan-Xiao], Yang, C.N.[Ching-Nung], Sun, Q.D.[Qin-Dong], Wu, S.Y.[Song-Yu], Lin, S.S.[Shin-Shang], Chou, Y.S.[Yung-Shun],
Enhanced embedding capacity for the SMSD-based data-hiding method,
SP:IC(78), 2019, pp. 216-222.
Elsevier DOI 1909
Data hiding, Embedding capacity, Sparse MSD, Enhanced MSD, Section-wise BibRef

Wang, Z., Zhang, X., Qian, Z.,
Practical Cover Selection for Steganography,
SPLetters(27), 2020, pp. 71-75.
IEEE DOI 2001
Distortion, Distortion measurement, Feature extraction, Wiener filters, Electronics packaging, Visualization, distortion BibRef

Yan, X.[Xuehu], Gong, Q.H.[Qing-Hong], Li, L.L.[Long-Long], Yang, G.Z.[Guo-Zheng], Lu, Y.L.[Yu-Liang], Liu, J.J.[Jing-Ju],
Secret image sharing with separate shadow authentication ability,
SP:IC(82), 2020, pp. 115721.
Elsevier DOI 2001
Secret image sharing, Shadow authentication, Pixel expansion, Lossless recovery BibRef

Fujii, M.[Mariko], Shibuya, T.[Tomoharu],
Improvement of the Quality of Visual Secret Sharing Schemes with Constraints on the Usage of Shares,
IEICE(E103-D), No. 1, January 2020, pp. 11-24.
WWW Link. 2001
BibRef

Zhang, Y.[Yi], Luo, X.Y.[Xiang-Yang], Zhu, X.D.[Xiao-Dong], Li, Z.Y.[Zhen-Yu], Bors, A.G.[Adrian G.],
Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes,
RealTimeIP(17), No. 1, February 2020, pp. 115-123.
Springer DOI 2002
BibRef

Xiao, D., Li, F., Wang, M., Zheng, H.,
A Novel High-Capacity Data Hiding in Encrypted Images Based on Compressive Sensing Progressive Recovery,
SPLetters(27), 2020, pp. 296-300.
IEEE DOI 2003
Data hiding, encrypted domain, compressive sensing, prediction coding, embedding capability BibRef

Prasad, S.[Shiv], Pal, A.K.[Arup Kumar],
Stego-key-based image steganography scheme using edge detector and modulus function,
IJCVR(10), No. 3, 2020, pp. 223-241.
DOI Link 2005
BibRef

Giboulot, Q.[Quentin], Cogranne, R.[Rémi], Borghys, D.[Dirk], Bas, P.[Patrick],
Effects and solutions of Cover-Source Mismatch in image steganalysis,
SP:IC(86), 2020, pp. 115888.
Elsevier DOI 2006
Steganography, Steganalysis, Cover-source mismatch, Image processing, Image heterogeneity BibRef

Aghababaiyan, K.[Keyvan], Mortazavi, A.S.[Amir S.],
Novel distortion free and histogram based data hiding scheme,
IET-IPR(14), No. 9, 20 July 2020, pp. 1716-1725.
DOI Link 2007
BibRef

Sardar, M.K.[Md Kutubuddin], Adhikari, A.[Avishek],
Essential secret image sharing scheme with small and equal sized shadows,
SP:IC(87), 2020, pp. 115923.
Elsevier DOI 2007
Grayscale image, Finite field, -threshold secret sharing scheme BibRef

Zhang, Y., Luo, X., Guo, Y., Qin, C., Liu, F.,
Multiple Robustness Enhancements for Image Adaptive Steganography in Lossy Channels,
CirSysVideo(30), No. 8, August 2020, pp. 2750-2764.
IEEE DOI 2008
Image coding, Resistance, Robustness, Transform coding, Discrete cosine transforms, Feature extraction, RS-STC codes BibRef

Wang, Y.G., Zhu, G., Li, J., Conti, M., Huang, J.,
Defeating Lattice-Based Data Hiding Code Via Decoding Security Hole,
CirSysVideo(31), No. 1, January 2021, pp. 76-87.
IEEE DOI 2101
Watermarking, Lattices, Decoding, Estimation, Quantization (signal), Indexes, Data hiding, watermarking security, lattice code, perfect decoding BibRef

Wang, Z., Feng, G., Ren, Y., Zhang, X.,
Multichannel Steganography in Digital Images for Multiple Receivers,
MultMedMag(28), No. 1, January 2021, pp. 65-73.
IEEE DOI 2104
Receivers, Data mining, Distortion, Media, Digital images, Feature extraction, Image coding, Steganography, Steganography, Sequential BibRef

Yan, X.[Xuehu], Lu, Y.L.[Yu-Liang], Yang, C.N.[Ching-Nung], Zhang, X.P.[Xin-Peng], Wang, S.D.[Shu-Dong],
A Common Method of Share Authentication in Image Secret Sharing,
CirSysVideo(31), No. 7, July 2021, pp. 2896-2908.
IEEE DOI 2107
Authentication, Encryption, Gray-scale, Digital images, Complexity theory, Image secret sharing, no pixel expansion BibRef

Zhu, J.H.[Jia-Hao], Zhang, Y.S.[Yu-Shu], Zhang, X.P.[Xin-Peng], Cao, X.C.[Xiao-Chun],
Gaussian Model for 3D Mesh Steganography,
SPLetters(28), 2021, pp. 1729-1733.
IEEE DOI 2109
Solid modeling, Correlation, Payloads, Faces, Task analysis, Probability density function, 3D mesh, mesh steganography BibRef

Chen, Y.L.[Yan-Li], Wang, H.X.[Hong-Xia], Wu, H.Z.[Han-Zhou], Zhou, Y.H.[Yong-Hui], Zhou, L.[Limengnan], Chen, Y.[Yi],
Exploiting texture characteristics and spatial correlations for robustness metric of data hiding with noisy transmission,
IET-IPR(15), No. 13, 2021, pp. 3160-3171.
DOI Link 2110
BibRef

Cui, J.B.[Jia-Bao], Zhang, P.Y.[Peng-Yi], Li, S.Y.[Song-Yuan], Zheng, L.L.[Liang-Li], Bao, C.[Cuizhu], Xia, J.P.[Ju-Peng], Li, X.[Xi],
Multitask Identity-Aware Image Steganography via Minimax Optimization,
IP(30), 2021, pp. 8567-8579.
IEEE DOI 2110
Containers, Image recognition, Image restoration, Optimization, Visualization, Privacy, Encryption, Image steganography, multitask learning BibRef

Guan, Q.X.[Qing-Xiao], Chen, H.[Hefeng], Zhang, W.M.[Wei-Ming], Yu, N.H.[Neng-Hai],
Improving UNIWARD distortion function via isotropic construction and hierarchical merging,
JVCIR(81), 2021, pp. 103333.
Elsevier DOI 2112
Steganography, Distortion, UNIWARD BibRef

Yang, Z.J.[Zi-Jin], Chen, K.J.[Ke-Jiang], Zeng, K.[Kai], Zhang, W.M.[Wei-Ming], Yu, N.H.[Neng-Hai],
Provably Secure Robust Image Steganography,
MultMed(26), 2024, pp. 5040-5053.
IEEE DOI 2404
Steganography, Security, Robustness, Generators, Social networking (online), Receivers, Transforms, Steganography, optimization BibRef

Xia, C.[Chao], Guan, Q.X.[Qing-Xiao], Zhao, X.F.[Xian-Feng], Dong, J.[Jing], Xu, Z.J.[Zhou-Jun],
Improving spatial image adaptive steganalysis incorporating the embedding impact on the feature,
ICIP17(515-519)
IEEE DOI 1803
Detectors, Distortion, Feature extraction, Histograms, Payloads, Quantization (signal), Random variables, Adaptive steganalysis, distinguishable L1 distortion BibRef

Zeng, K.[Kai], Chen, K.J.[Ke-Jiang], Zhang, W.M.[Wei-Ming], Wang, Y.F.[Yao-Fei],
Upward Robust Steganography Based on Overflow Alleviation,
MultMed(26), 2024, pp. 299-312.
IEEE DOI 2401
BibRef

Yu, X.Z.[Xin-Zhi], Chen, K.J.[Ke-Jiang], Zhang, W.M.[Wei-Ming], Wang, Y.F.[Yao-Fei], Yu, N.H.[Neng-Hai],
Improving the Embedding Strategy for Batch Adaptive Steganography,
IWDW18(248-260).
Springer DOI 1905
BibRef

Wang, Z.C.[Zi-Chi], Feng, G.R.[Guo-Rui], Zhang, X.P.[Xin-Peng],
Repeatable Data Hiding: Towards the Reusability of Digital Images,
CirSysVideo(32), No. 1, January 2022, pp. 135-146.
IEEE DOI 2201
Authentication, Distortion, Payloads, Mathematical model, Fingerprint recognition, Usability, Remote sensing, Data hiding, distortion BibRef

Li, F.Y.[Feng-Yong], Zeng, Y.[Yishu], Zhang, X.P.[Xin-Peng], Qin, C.[Chuan],
Ensemble Stego Selection for Enhancing Image Steganography,
SPLetters(29), 2022, pp. 702-706.
IEEE DOI 2203
Costs, Steganography, Distortion, Feature extraction, Training, Graphics, Convolutional codes, Ensemble selection, gradient, image steganography BibRef

Soreng, A.V.[Aswini Vinay], Kandar, S.[Shyamalendu],
Verifiable varying sized (m,n,n) multi-image secret sharing with combiner verification and cheater identification,
JVCIR(84), 2022, pp. 103466.
Elsevier DOI 2204
Multi-image secret sharing, Varying sized, Verifiable multi image secret sharing, Dealer authentication, Combiner verification BibRef

Gajabe, R.[Rajashree], Ali, S.T.[Syed Taqi],
Secret Key-Based Image Steganography in Spatial Domain,
IJIG(22), No. 2, April 2022, pp. 2250014.
DOI Link 2205
BibRef

Zhu, L.Y.[Li-Yan], Luo, X.Y.[Xiang-Yang], Zhang, Y.[Yi], Yang, C.F.[Chun-Fang], Liu, F.L.[Fen-Lin],
Inverse Interpolation and Its Application in Robust Image Steganography,
CirSysVideo(32), No. 6, June 2022, pp. 4052-4064.
IEEE DOI 2206
Interpolation, Distortion, Resists, Propagation losses, Watermarking, Mathematical model, Image coding, Robust image steganography, statistical detection BibRef

Xing, F.Y.[Feng-Yue], Yan, X.[Xuehu], Yu, L.[Long], Sun, Y.Y.[Yu-Yuan],
Information hiding in the sharing domain,
JVCIR(86), 2022, pp. 103520.
Elsevier DOI 2206
Secret image sharing, Random element utilization model, Information hiding BibRef

Liu, X.Y.[Xi-Yao], Ma, Z.P.[Zi-Ping], Chen, Z.H.[Zhi-Hong], Li, F.F.[Fang-Fang], Jiang, M.[Ming], Schaefer, G.[Gerald], Fang, H.[Hui],
Hiding multiple images into a single image via joint compressive autoencoders,
PR(131), 2022, pp. 108842.
Elsevier DOI 2208
Image hiding, Neural networks, Deep learning, Compressive autoencoder BibRef

Liu, X.Y.[Xi-Yao], Ma, Z.P.[Zi-Ping], Ma, J.X.[Jun-Xing], Zhang, J.[Jian], Schaefer, G.[Gerald], Fang, H.[Hui],
Image Disentanglement Autoencoder for Steganography without Embedding,
CVPR22(2293-2302)
IEEE DOI 2210
Steganography, Resists, Pattern recognition, Security, Reliability, Capacity planning, Vision applications and systems, Image and video synthesis and generation BibRef

Liu, X.Y.[Xi-Yao], Ma, Z.P.[Zi-Ping], Guo, X.B.[Xing-Bei], Hou, J.L.[Jia-Lu], Wang, L.[Lei], Zhang, J.[Jian], Schaefer, G.[Gerald], Fang, H.[Hui],
Joint compressive autoencoders for full-image-to-image hiding,
ICPR21(7743-7750)
IEEE DOI 2105
Learning systems, Visualization, Image coding, Image representation, Containers, Security, compressive autoencoder BibRef

Khan, A.A.[Abdullah Ayub], Shaikh, A.A.[Aftab Ahmed], Cheikhrouhou, O.[Omar], Laghari, A.A.[Asif Ali], Rashid, M.[Mamoon], Shafiq, M.[Muhammad], Hamam, H.[Habib],
IMG-forensics: Multimedia-enabled information hiding investigation using convolutional neural network,
IET-IPR(16), No. 11, 2022, pp. 2854-2862.
DOI Link 2208
BibRef

Chen, Y.J.[Yi-Jing], Wang, H.X.[Hong-Xia], Li, W.[Wanjie], Luo, J.[Jie],
Cost Reassignment for Improving Security of Adaptive Steganography Using an Artificial Immune System,
SPLetters(29), 2022, pp. 1564-1568.
IEEE DOI 2208
Steganography, Costs, Security, Artificial intelligence, Cost function, Transforms, Statistics, artificial immune system BibRef

Chen, M.[Menghua], He, P.S.[Pei-Song], Liu, J.Y.[Jia-Yong],
HLTD-CSA: Cover selection algorithm based on hybrid local texture descriptor for color image steganography,
JVCIR(89), 2022, pp. 103646.
Elsevier DOI 2212
Color image steganography, Cover selection, Hybrid local texture, Channel correlations BibRef

Li, G.F.[Guo-Feng], Feng, B.W.[Bing-Wen], He, M.J.[Ming-Jin], Weng, J.[Jian], Lu, W.[Wei],
High-capacity coverless image steganographic scheme based on image synthesis,
SP:IC(111), 2023, pp. 116894.
Elsevier DOI 2301
Coverless image steganography, High capacity, Image synthesis, Cross-domain image translation BibRef

Feng, B.W.[Bing-Wen], Lu, W.[Wei], Sun, W.[Wei],
High Capacity Data Hiding Scheme for Binary Images Based on Minimizing Flipping Distortion,
IWDW13(514-528).
Springer DOI 1407
BibRef

Wei, P.[Ping], Zhu, Z.Y.[Zhi-Ying], Luo, G.[Ge], Qian, Z.X.[Zhen-Xing], Zhang, X.P.[Xin-Peng],
Breaking Robust Data Hiding in Online Social Networks,
SPLetters(29), 2022, pp. 2682-2686.
IEEE DOI 2301
Un-hiding the information without knowing the key. Image fusion, Steganography, Kernel, Watermarking, Smoothing methods, Image quality, Social networking (online), Image sanitization, secret removal BibRef

Wu, H.Z.[Han-Zhou], Li, C.[Chen], Liu, G.[Gen], Zhang, X.P.[Xin-Peng],
Hiding data hiding,
PRL(165), 2023, pp. 122-127.
Elsevier DOI 2301
Hiding data hiding, Covert communication, Deep learning, Security BibRef

Feng, B.W.[Bing-Wen], Li, G.F.[Guo-Feng], Luo, Z.Q.[Zhi-Quan], Lu, W.[Wei],
Multilevel histogram shape-based image watermarking invariant to geometric attacks,
IET-IPR(17), No. 7, 2023, pp. 2097-2112.
DOI Link 2305
geometric attacks, histogram shape, image watermarking, robustness, security of data BibRef

Feng, B.W.[Bing-Wen], Weng, J.[Jian], Lu, W.[Wei],
Improved Algorithms for Robust Histogram Shape-Based Image Watermarking,
IWDW17(275-289).
Springer DOI 1708
BibRef

Meng, L.[Laijin], Jiang, X.H.[Xing-Hao], Zhang, Z.Z.[Zhen-Zhen], Li, Z.H.[Zhao-Hong], Sun, T.F.[Tan-Feng],
A Robust Coverless Image Steganography Based on an End-to-End Hash Generation Model,
CirSysVideo(33), No. 7, July 2023, pp. 3542-3558.
IEEE DOI 2307
Steganography, Feature extraction, Robustness, Indexes, Receivers, Image segmentation, Resists, Coverless information hiding, end-to-end hash generation BibRef

Prasad, S.[Shiv], Pal, A.K.[Arup Kumar], Mukherjee, S.[Soumya],
An RGB Color Image Steganography Scheme by Binary Lower Triangular Matrix,
ITS(24), No. 7, July 2023, pp. 6865-6873.
IEEE DOI 2307
Steganography, Color, Image color analysis, Visualization, Payloads, Streaming media, Genetic algorithms, Color image steganography, stego-image BibRef

Singh, O.P.[Om Prakash], Singh, A.K.[Amit Kumar], Zhou, H.Y.[Hui-Yu],
Multimodal Fusion-Based Image Hiding Algorithm for Secure Healthcare System,
IEEE_Int_Sys(38), No. 4, July 2023, pp. 53-61.
IEEE DOI 2309
BibRef

Majumder, A.[Anandaprova], Kundu, S.[Sumana], Changder, S.[Suvamoy],
A unique database synthesis technique for coverless data hiding,
JVCIR(96), 2023, pp. 103911.
Elsevier DOI 2310
Security and privacy protection, Coverless data hiding, Privacy attacks, Object synthesis, Database synthesis, Steganography BibRef

Zhang, L.[Le], Lu, Y.[Yao], Li, T.[Tong], Lu, G.M.[Guang-Ming],
Joint adjustment image steganography networks,
SP:IC(118), 2023, pp. 117022.
Elsevier DOI 2310
Image steganography, Image hiding, Joint adjustment, JAIS-nets BibRef

Xu, S.Y.[Shu-Ying], Chang, C.C.[Chin-Chen], Horng, J.H.[Ji-Hwei],
Image Covert Communication With Block Regulation,
SPLetters(30), 2023, pp. 1217-1221.
IEEE DOI 2310
BibRef

Zhang, X.B.[Xuan-Bo], Zhang, X.P.[Xin-Peng], Feng, G.R.[Guo-Rui],
Image Steganalysis Network Based on Dual-Attention Mechanism,
SPLetters(30), 2023, pp. 1287-1291.
IEEE DOI 2310
BibRef

Wang, Z.C.[Zi-Chi], Feng, G.R.[Guo-Rui], Zhang, X.P.[Xin-Peng],
Steganographic Distortion Function for Enhanced Images,
IWDW20(31-40).
Springer DOI 2103
BibRef

Zeng, K.[Kai], Chen, K.J.[Ke-Jiang], Zhang, W.M.[Wei-Ming], Wang, Y.F.[Yao-Fei], Yu, N.H.[Neng-Hai],
Robust Steganography for High Quality Images,
CirSysVideo(33), No. 9, September 2023, pp. 4893-4906.
IEEE DOI 2310
BibRef

Wu, X.T.[Xiao-Tian], Xu, Z.[Zishuo], Yan, W.Q.[Wei-Qi],
Sharing Visual Secrets Among Multiple Groups With Enhanced Performance,
CirSysVideo(33), No. 11, November 2023, pp. 6503-6518.
IEEE DOI 2311
BibRef

Yin, X.L.[Xiao-Lin], Wu, S.[Shaowu], Wang, K.[Ke], Lu, W.[Wei], Zhou, Y.C.[Yi-Cong], Huang, J.W.[Ji-Wu],
Anti-Rounding Image Steganography With Separable Fine-Tuned Network,
CirSysVideo(33), No. 11, November 2023, pp. 7066-7079.
IEEE DOI 2311
BibRef

Zou, L.M.[Li-Ming], Li, J.[Jing], Wan, W.B.[Wen-Bo], Wu, Q.M.J.[Q. M. Jonathan], Sun, J.D.[Jian-De],
Robust Coverless Image Steganography Based on Neglected Coverless Image Dataset Construction,
MultMed(25), 2023, pp. 5552-5564.
IEEE DOI 2311
BibRef

Cui, Q.[Qi], Zhou, Z.[Zhili], Meng, R.[Ruohan], Wang, S.W.[Shao-Wei], Yan, H.Y.[Hong-Yang], Wu, Q.M.J.[Q. M. Jonathan],
ARES: On Adversarial Robustness Enhancement for Image Steganographic Cost Learning,
MultMed(26), 2024, pp. 6542-6553.
IEEE DOI 2404
Cost function, Steganography, Costs, Generators, Feature extraction, Training, Generative adversarial networks, Steganography, GAN, Cost learning BibRef

He, J.[Jian], Weng, S.W.[Shao-Wei], Yu, L.F.[Li-Fang], Zhang, C.Y.[Chun-Yu], Chen, W.[Wei],
An Image Steganoganalyzer With Comprehensive Detection Performance,
SPLetters(30), 2023, pp. 1682-1686.
IEEE DOI 2312
BibRef

Li, W.J.[Wan-Jie], Wang, H.X.[Hong-Xia], Chen, Y.J.[Yi-Jing], Abdullahi, S.M.[Sani M.], Luo, J.[Jie],
Constructing Immunized Stego-Image for Secure Steganography via Artificial Immune System,
MultMed(25), 2023, pp. 8320-8333.
IEEE DOI 2312
BibRef

Wang, H.X.[Hong-Xia], Chen, Z.L.[Zhi-Long], He, P.S.[Pei-Song],
Constructing Immune Cover for Secure Steganography Based on an Artificial Immune System Approach,
IWDW20(53-67).
Springer DOI 2103
BibRef

Xiang, L.Y.[Ling-Yun], Xia, J.L.[Jia-Li], Liu, Y.F.[Yang-Fan], Gui, Y.[Yan],
CPG-LS: Causal Perception Guided Linguistic Steganography,
SPLetters(30), 2023, pp. 1762-1766.
IEEE DOI 2312
BibRef

Weng, S.W.[Shao-Wei], Sun, S.[Shiyao], Yu, L.F.[Li-Fang],
Fast SwT-Based Deep Steganalysis Network for Arbitrary-Sized Images,
SPLetters(30), 2023, pp. 1782-1786.
IEEE DOI 2312
BibRef

Saeidi, Z.[Zahra], Yazdi, A.[Ameneh], Mashhadi, S.[Samaneh], Hadian, M.[Masoud], Gutub, A.[Adnan],
High performance image steganography integrating IWT and Hamming code within secret sharing,
IET-IPR(18), No. 1, 2024, pp. 129-139.
DOI Link 2401
image watermarking, steganography BibRef

Wang, R.[Rui], Yang, G.Z.[Guo-Zheng], Yan, X.[Xuehu], Luo, S.Y.[Sheng-Yang], Han, Q.[Qiang],
Secret image sharing in the encrypted domain,
JVCIR(98), 2024, pp. 104013.
Elsevier DOI 2402
Secret image sharing, Image encrypted domain, Formal definition, Evaluation metrics BibRef

Ma, Y.Y.[Yuan-Yuan], Xu, L.[Lige], Zhang, Y.[Yi], Zhang, T.[Tao], Luo, X.Y.[Xiang-Yang],
Steganalysis Feature Selection With Multidimensional Evaluation and Dynamic Threshold Allocation,
CirSysVideo(34), No. 3, March 2024, pp. 1954-1969.
IEEE DOI 2403
Feature extraction, Resource management, Deep learning, Steganography, Principal component analysis, Dynamic scheduling, cosine similarity BibRef

Duan, X.T.[Xin-Tao], Wu, G.M.[Guo-Ming], Li, C.[Chun], Li, Z.[Zhuang], Qin, C.[Chuan],
DUIANet: A double Layer U-Net Image Hiding Method Based on Improved Inception Module and Attention Mechanism,
JVCIR(98), 2024, pp. 104035.
Elsevier DOI 2402
Image hiding, Attention mechanism, Improved Inception module, Double-layer U-Net BibRef

Yao, Y.[Ye], Huang, L.C.[Lin-Chao], Wang, H.[Hui], Chang, Q.[Qi], Ren, Y.Z.[Yi-Zhi], Xiao, F.J.[Feng-Jun],
Robust Adaptive Steganography Based on Adaptive STC-ECC,
MultMed(26), 2024, pp. 5477-5489.
IEEE DOI 2404
Security, Robustness, Steganography, Transform coding, Discrete cosine transforms, Image coding, Error correction codes, adaptive STC-ECC strategy BibRef

Weng, S.W.[Shao-Wei], Zhang, Z.[Zhuwei], Yu, L.F.[Li-Fang], Cao, P.[Peng], Cao, G.[Gang],
Universal Mismatched Steganalysis Equipped With Progressive Intermediate Domains,
SPLetters(31), 2024, pp. 800-804.
IEEE DOI 2404
Transform coding, Feature extraction, Training, Symbols, Steganography, Entropy, Bridges, Stegananlysis, CSM, IDGM, LFMP BibRef

Fu, Z.X.[Zheng-Xin], Huang, H.Y.[Hang-Ying], Yu, B.[Bin], Li, X.P.[Xiao-Peng],
Size-invariant two-in-one image secret sharing scheme based on gray mixing model,
JVCIR(100), 2024, pp. 104134.
Elsevier DOI 2405
Size-invariant Visual Cryptography Scheme, TiOISSS, Multi-level grayscale image, Grayscale probabilistic matrix BibRef

Li, X.P.[Xiao-Peng], Fu, Z.X.[Zheng-Xin], Yu, B.[Bin],
A novel extended secret image sharing scheme based on sharing matrix,
JVCIR(101), 2024, pp. 104149.
Elsevier DOI 2406
Secret image sharing, No pixel expansion, Meaningful natural shares, Search window BibRef

Dharwadkar, N.V.[Nagaraj V.], Lonikar, A.A.[Ashutosh A.], Mahmud, M.[Mufti],
High Embedding Capacity Color Image Steganography Scheme Using Pixel Value Differencing and Addressing the Falling-Off Boundary Problem,
IJIG(24), No. 4, July 2024, pp. 2450047.
DOI Link 2408
BibRef

Cheng, Z.[Zien], Jin, X.[Xin], Jiang, Q.[Qian], Wu, L.W.[Li-Wen], Dong, Y.Y.[Yun-Yun], Zhou, W.[Wei],
SIHNet: A safe image hiding method with less information leaking,
IET-IPR(18), No. 10, 2024, pp. 2800-2815.
DOI Link 2408
data privacy, image watermarking, learning (artificial intelligence), security of data, signal processing BibRef


Han, G.[Gyojin], Lee, D.J.[Dong-Jae], Hur, J.[Jiwan], Choi, J.[Jaehyun], Kim, J.[Junmo],
Deep Cross-Modal Steganography Using Neural Representations,
ICIP23(1205-1209)
IEEE DOI 2312
BibRef

Fu, H.C.[Hao-Cheng], Zhao, X.F.[Xian-Feng], He, X.L.[Xiao-Lei],
High-performance Steganographic Coding Based on Sub-polarized Channel,
IWDW22(3-19).
Springer DOI 2307
BibRef

Jia, J.[Jun], Gao, Z.P.[Zhong-Pai], Zhu, D.D.[Dan-Dan], Min, X.K.[Xiong-Kuo], Zhai, G.T.[Guang-Tao], Yang, X.K.[Xiao-Kang],
Learning Invisible Markers for Hidden Codes in Offline-to-online Photography,
CVPR22(2263-2272)
IEEE DOI 2210
Training, Photography, Location awareness, Visualization, Technological innovation, Codes, Vision applications and systems, Computer vision for social good BibRef

Bertojo, L.[Laura], Puech, W.[William],
Correction of Secret Images Reconstructed from Noised Shared Images,
IPTA22(1-6)
IEEE DOI 2206
Steganography, Image coding, Databases, Image edge detection, Mathematical analysis, Transform coding, Information security, Error correction BibRef

Feng, B.W.[Bing-Wen], Liu, Z.Q.[Zhi-Quan], Wei, K.M.[Kai-Min], Lu, W.[Wei], Lin, Y.C.[Yu-Chun],
Variable Rate Syndrome-trellis Codes for Steganography on Bursty Channels,
IWDW20(15-30).
Springer DOI 2103
BibRef

Hu, Y.T.[Yu-Ting], Yang, Z.L.[Zhong-Liang], Cao, H.[Han], Huang, Y.F.[Yong-Feng],
Multi-modal Steganography Based on Semantic Relevancy,
IWDW20(3-14).
Springer DOI 2103
BibRef

Zhao, X.F.[Xian-Feng], Yang, C.F.[Chun-Fang], Liu, F.L.[Fen-Lin],
On the Sharing-based Model of Steganography,
IWDW20(94-105).
Springer DOI 2103
BibRef

El-Arsh, H.Y., Abdelaziz, A., Elliethy, A., Aly, H.A.,
Fundamental Limits Of Steganographic Capacity For Multivariate-Quantized-Gaussian-Distributed Multimedia,
ICIP20(1246-1250)
IEEE DOI 2011
Entropy, Detectors, Streaming media, Videos, Mutual information, Optimization, Probability BibRef

Ong, S., Wong, K.,
Information Hiding In Image Enhancement,
ICIP20(1261-1265)
IEEE DOI 2011
Data mining, Error analysis, Image quality, Image enhancement, Speckle, Noise level, Median filter, data extraction error rate BibRef

Tancik, M., Mildenhall, B., Ng, R.,
StegaStamp: Invisible Hyperlinks in Physical Photographs,
CVPR20(2114-2123)
IEEE DOI 2008
Robustness, Decoding, Cameras, Hypertext systems, Perturbation methods, Image coding, Image color analysis BibRef

Ma, J.F.[Jian-Feng], Yin, L.P.[Li-Ping], Li, P.[Peng],
Cheating Detection in (k, n) Secret Image Sharing Scheme,
IWDW19(421-428).
Springer DOI 2003
BibRef

Gong, C.[Chen], Zhao, X.F.[Xian-Feng],
New Steganalytic Approach for AMR Steganography Based on Block-wise of Pulse Position Distribution and Neighboring Joint Density,
IWDW19(307-321).
Springer DOI 2003
BibRef

Xu, M.T.[Meng-Tian], Wu, H.Z.[Han-Zhou], Feng, G.R.[Guo-Rui], Zhang, X.P.[Xin-Peng], Ding, F.[Feng],
Broadcasting Steganography in the Blockchain,
IWDW19(256-267).
Springer DOI 2003
BibRef

Zhou, S.J.[Shi-Jun], Tang, W.X.[Wei-Xuan], Tan, S.Q.[Shun-Quan], Li, B.[Bin],
Content-Adaptive Steganalysis via Augmented Utilization of Selection-Channel Information,
IWDW18(261-274).
Springer DOI 1905
BibRef

Yan, X.[Xuehu], Lu, Y.L.[Yu-Liang], Liu, L.T.[Lin-Tao], Wan, S.[Song], Ding, W.M.[Wan-Meng], Liu, H.L.[Han-Lin],
Secret Image Sharing for (k, k) Threshold Based on Chinese Remainder Theorem and Image Characteristics,
PSIVT17(174-181).
Springer DOI 1802
BibRef

Guan, Q.X.[Qing-Xiao], Dong, J.[Jing], Tan, T.N.[Tie-Niu],
An effective image steganalysis method based on neighborhood information of pixels,
ICIP11(2721-2724).
IEEE DOI 1201
BibRef

Guan, Q.X.[Qing-Xiao], Dong, J.[Jing], Tan, T.N.[Tie-Niu],
Blind Quantitative Steganalysis Based on Feature Fusion and Gradient Boosting,
DW10(266-279).
Springer DOI 1010
BibRef

Dong, J.[Jing], Chen, X.C.[Xiao-Chuan], Guo, L.[Lei], Tan, T.N.[Tie-Niu],
Fusion Based Blind Image Steganalysis by Boosting Feature Selection,
DW07(87-98).
Springer DOI 0712
BibRef

Chen, X.C.[Xiao-Chuan], Wang, Y.H.[Yun-Hong], Tan, T.N.[Tie-Niu], Guo, L.[Lei],
Blind Image Steganalysis Based on Statistical Analysis of Empirical Matrix,
ICPR06(III: 1107-1110).
IEEE DOI 0609
BibRef

Hu, D.H.[Dong-Hui], Ma, Z.J.[Zhong-Jin], Fan, Y.Q.[Yu-Qi], Wang, L.[Lina],
A Study of the Two-Way Effects of Cover Source Mismatch and Texture Complexity in Steganalysis,
IWDW16(601-615).
Springer DOI 1703
BibRef

Huang, W.[Wei], Zhao, X.F.[Xian-Feng],
Reliable Pooled Steganalysis Using Fine-Grained Parameter Estimation and Hypothesis Testing,
IWDW16(550-563).
Springer DOI 1703
BibRef

Chang, C.C.[Chin-Chen], Chang, J.C.[Jen-Chun], Chou, Y.H.[Yun-Hong], Wu, H.L.[Hsin-Lung],
A High Embedding Capacity Data Hiding Scheme Based upon Permutation Vectors,
IWDW16(578-587).
Springer DOI 1703
BibRef

Zhao, Z.Z.[Zeng-Zhen], Guan, Q.X.[Qing-Xiao], Zhao, X.F.[Xian-Feng], Yu, H.B.[Hai-Bo], Liu, C.J.[Chang-Jun],
Embedding Strategy for Batch Adaptive Steganography,
IWDW16(494-505).
Springer DOI 1703
BibRef

Wang, R.[Ran], Ping, X.J.[Xi-Jian], Niu, S.Z.[Shao-Zhang], Zhang, T.[Tao],
Segmentation Based Steganalysis of Spatial Images Using Local Linear Transform,
IWDW16(533-549).
Springer DOI 1703
BibRef

Bian, Y.[Yuan], Tang, G.M.[Guang-Ming], Wang, S.[Shuo], Gao, Z.Z.[Zhan-Zhan], Chen, S.Y.[Shi-Yuan],
Adaptive Steganography Using 2D Gabor Filters and Ensemble Classifiers,
IWDW16(506-517).
Springer DOI 1703
BibRef

Lin, Q., Liu, J., Guo, Z.,
Local ternary pattern based on path integral for steganalysis,
ICIP16(2737-2741)
IEEE DOI 1610
Calibration BibRef

Sedighi, V., Fridrich, J.,
Effect of saturated pixels on security of steganographic schemes for digital images,
ICIP16(2747-2751)
IEEE DOI 1610
Databases BibRef

Renza, D.[Diego], Ballesteros L., D.M.[Dora M.], Sanchez, J.[Jeisson],
Highly Transparent Steganography Scheme of Speech Signals into Color Images Using Quantization Index Modulation,
MCPR16(241-250).
Springer DOI 1608
BibRef

Lin, X.[Xu], Feng, B.W.[Bing-Wen], Lu, W.[Wei], Sun, W.[Wei],
Content-Adaptive Residual for Steganalysis,
IWDW14(389-398).
Springer DOI 1602
BibRef

Chen, L.C.[Li-Cong], Shi, Y.Q.[Yun-Qing], Sutthiwan, P.[Patchara],
Variable Multi-dimensional Co-occurrence for Steganalysis,
IWDW14(559-573).
Springer DOI 1602
BibRef

Feng, B.W.[Bing-Wen], Lu, W.[Wei], Dai, L.[Lu], Sun, W.[Wei],
Steganography Based on High-Dimensional Reference Table,
IWDW14(574-587).
Springer DOI 1602
BibRef

Itier, V., Puech, W.[William], Pedeboy, J.P.[Jean-Pierre],
Highcapacity data-hiding for 3D meshes based on static arithmetic coding,
ICIP15(4575-4579)
IEEE DOI 1511
3D data hiding; geometry synchronization; high capacity BibRef

Xu, X.[Xikai], Dong, J.[Jing], Wang, W.[Wei], Tan, T.N.[Tie-Niu],
Robust steganalysis based on training set construction and ensemble classifiers weighting,
ICIP15(1498-1502)
IEEE DOI 1511
Steganography; ensemble classifiers; sample selection; steganalysis BibRef

Mohanty, M., Gehrmann, C., Atrey, P.K.,
Avoiding weak parameters in secret image sharing,
VCIP14(506-509)
IEEE DOI 1504
cryptography BibRef

Lee, S.K.[Suk Kyu], Bae, M.Y.[Mung-Yu], Chung, A.Y., Kim, H.[Hwangnam],
D-mago: A novel visual entity for storing emotional feeling with visual imprint,
VCIP14(466-469)
IEEE DOI 1504
image processing. Data hiding. BibRef

Mahajan, M., Kaur, N.,
Secret communication in colored images using saliency map as model,
AIPR14(1-10)
IEEE DOI 1504
image coding BibRef

Dominguez-Conde, G.[Gabriel], Comesana-Alfaro, P.[Pedro], Perez-Gonzalez, F.[Fernando],
A new look at ML step-size estimation for Scalar Costa scheme data hiding,
ICIP14(4211-4215)
IEEE DOI 1502
Bit error rate BibRef

Qiao, T.[Tong], Zitzmann, C.[Cathel], Retraint, F.[Florent], Cogranne, R.[Remi],
Statistical detection of Jsteg steganography using hypothesis testing theory,
ICIP14(5517-5521)
IEEE DOI 1502
Detectors BibRef

Yang, Y.[Ying], Pintus, R.[Ruggero], Rushmeier, H.[Holly], Ivrissimtzis, I.[Ioannis],
A steganalytic algorithm for 3D polygonal meshes,
ICIP14(4782-4786)
IEEE DOI 1502
Accuracy BibRef

Li, B.[Bin], Wang, M.[Ming], Huang, J.W.[Ji-Wu], Li, X.L.[Xiao-Long],
A new cost function for spatial image steganography,
ICIP14(4206-4210)
IEEE DOI 1502
Additives BibRef

Al-Dmour, H.[Hayat], Ali, N.[Noman], Al-Ani, A.[Ahmed],
An Efficient Hybrid Steganography Method Based on Edge Adaptive and Tree Based Parity Check,
MMMod15(I: 1-12).
Springer DOI 1501
BibRef

Ou, D.H.[Duan-Hao], Wu, X.T.[Xiao-Tian], Dai, L.[Lu], Sun, W.[Wei],
Secret Sharing in Images Based on Error-Diffused Block Truncation Coding and Error Diffusion,
IWDW13(123-138).
Springer DOI 1407
BibRef

Liu, S.C.[Shen-Chuan], Fujiyoshi, M.[Masaaki], Kiya, H.[Hitoshi],
A Cheat-Prevention Visual Secret Sharing Scheme with Minimum Pixel Expansion,
IWDW13(362-375).
Springer DOI 1407
BibRef

Köhler, O.M.[Olaf Markus], Pasquini, C.[Cecilia], Böhme, R.[Rainer],
On the Statistical Properties of Syndrome Trellis Coding,
IWDW17(331-346).
Springer DOI 1708
Use Syndrome Trellis Coding (STC) to control the selection of embedding positions. BibRef

Johnson, B.[Benjamin], Schöttle, P.[Pascal], Laszka, A.[Aron], Grossklags, J.[Jens], Böhme, R.[Rainer],
Bitspotting: Detecting Optimal Adaptive Steganography,
IWDW13(3-18).
Springer DOI 1407
BibRef

Singh, R.K., Lall, B.,
Saliency map based image steganography,
IVCNZ13(430-435)
IEEE DOI 1402
image watermarking BibRef

Zeng, Y.C.[Yi-Chong], Tsai, C.H.[Chi-Hung],
High capacity multi-scale image sharing scheme by combining visual cryptography with data hiding,
ICIP13(4536-4539)
IEEE DOI 1402
Visual cryptography; capacity; data hiding; downscaling; secret sharing BibRef

Wilkowski, A.[Artur], Kasprzak, W.[Wlodzimierz],
Steganographic Authentication Method for Electronic IDs,
ICIAR13(726-733).
Springer DOI 1307
BibRef

Najeena, K.S., Imran, B.M.,
An efficient steganographic technique based on chaotic maps and adpative PPM embedding,
ICSIPR13(293-297).
IEEE DOI 1304
BibRef

Nadiya, P.V., Imran, B.M.[B. Mohammed],
Image steganography in DWT domain using double-stegging with RSA encryption,
ICSIPR13(283-287).
IEEE DOI 1304
BibRef

Chaumont, M.[Marc], Kouider, S.[Sarra],
Steganalysis by ensemble classifiers with boosting by regression, and post-selection of features,
ICIP12(1133-1136).
IEEE DOI 1302
BibRef

Mainberger, M.[Markus], Schmaltz, C.[Christian], Berg, M.[Matthias], Weickert, J.[Joachim], Backes, M.[Michael],
Diffusion-based Image Compression in Steganography,
ISVC12(II: 219-228).
Springer DOI 1209
BibRef

Wang, X.F.[Xiao-Feng], Li, Z.[Zhen], Zhang, X.[Xiaoni], Wang, S.P.[Shang-Ping], Chen, J.[Jing],
(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images,
IWDW11(425-438).
Springer DOI 1208
BibRef

Wang, H.T.[Hong-Tao], Liu, M.[Meng], Li, Q.[Qian], Yang, H.T.[Hai-Tao], Li, H.Q.[Hou-Qiang],
Region based motion vector prediction using data hiding and decoder side reasoning,
VCIP11(1-4).
IEEE DOI 1201
BibRef

Niimi, M.[Michiharu], Noda, H.[Hideki],
An application of Sparse Code Shrinkage to image steganalysis based on supervised learning,
ICIP11(1941-1944).
IEEE DOI 1201
BibRef

Suresh, N.[Nakum], Karthik, K.[Kannan],
Secure fingerprint embedding based on modified GDFT based parametric transform,
ICIIP11(1-6).
IEEE DOI 1112
BibRef

Sharma, M.[Manoj], Shukla, M.[Manoj], Kaul, A.[Amit],
Image hiding using unitary similarity transformation,
ICIIP11(1-4).
IEEE DOI 1112
BibRef

Basu, A.[Abhishek], Das, T.S.[Tirtha Sankar], Sarkar, S.K.[Subir Kumar], Majumder, S.[Swanirbhar],
On the implementation of a information hiding design based on saliency map,
ICIIP11(1-6).
IEEE DOI 1112
BibRef

Arya, M.S.[Meenakshi S], Jain, N.[Nikita], Sisodia, J.[Jai], Sehgal, N.[Nukul],
DNA encoding based feature extraction for biometric watermarking,
ICIIP11(1-6).
IEEE DOI 1112
BibRef

Kavehvash, Z.[Zahra], Ghaemmaghami, S.[Shahrokh],
On Limits of Embedding in 3D Images Based on 2D Watson's Model,
DW10(293-304).
Springer DOI 1010
BibRef

Liwicki, M.[Marcus], Uchida, S.[Seiichi], Iwamura, M.[Masakazu], Omachi, S.[Shinichiro], Kise, K.[Koichi],
Embedding Meta-Information in Handwriting: Reed-Solomon for Reliable Error Correction,
FHR10(51-56).
IEEE DOI 1011
BibRef

Wang, J.X.[Jun-Xiang], Ni, J.Q.[Jiang-Qun],
A fast performance estimation scheme for histogram shifting based multi-layer embedding,
ICIP10(3701-3704).
IEEE DOI 1009
a lossless data hiding scheme. Limited capacity. BibRef

Guo, M.[Meng], Zhang, H.B.[Hong-Bin],
High Capacity Data Hiding for Binary Image Authentication,
ICPR10(1441-1444).
IEEE DOI 1008
BibRef

Huang, C.P.[Chin-Pan],
A new scheme of sharing secrets in stego images with authentication,
ICIP09(1269-1272).
IEEE DOI 0911
BibRef

Gao, Y.K.[Yun-Kai], Li, X.L.[Xiao-Long], Zeng, T.Y.[Tie-Yong], Yang, B.[Bin],
Improving embedding efficiency via matrix embedding: A case study,
ICIP09(109-112).
IEEE DOI 0911
BibRef

Gul, G.[Gokhan], Kurugollu, F.[Fatih],
A novel universal steganalyser design: 'LogSv',
ICIP09(4249-4252).
IEEE DOI 0911
BibRef

Yu, X.Y.[Xiao Yi], Wang, A.[Aiming],
An improved lossless data hiding based on space filling curves,
ICIP09(4221-4224).
IEEE DOI 0911
BibRef

Nabaee, H., Faez, K.,
An efficient steganography method based on reducing changes,
IVCNZ10(1-7).
IEEE DOI 1203
BibRef

Famili, Z.[Zainab], Faez, K.[Karim], Fadavi, A.[Abbas],
A New Steganography Based on L2 Technic,
CIARP09(1062-1069).
Springer DOI 0911
BibRef

Deng, Q.L.[Qian-Lan], Lin, J.J.[Jia-Jun],
A Universal Steganalysis Using Features Derived from the Differential Image Histogram in Frequency Domain,
CISP09(1-4).
IEEE DOI 0910
BibRef

Zhang, L.[Liang],
Wavelet Domain Steganalysis Based on Predictability Analysis and Magnitude Prediction,
CISP09(1-4).
IEEE DOI 0910
BibRef

Yu, X.Y.[Xiao Yi], Wang, A.[Aiming],
Steganography with Hash,
CISP09(1-4).
IEEE DOI 0910
BibRef
And:
Steganalysis Based on Bayesion Network and Genetic Algorithm,
CISP09(1-4).
IEEE DOI 0910
BibRef

Sohn, H.[Hosik], Ro, Y.M.[Yong Man], Plataniotis, K.N.[Kostantinos N.],
Content Sharing Based on Personal Information in Virtually Secured Space,
DW08(388-400).
Springer DOI 0811
BibRef

Huang, H.J.[Hua-Jun], Tan, J.S.[Jun-Shan], Sun, X.M.[Xing-Ming], Liu, L.X.[Ling-Xi],
Detection of Hidden Information in Webpage Based on Higher-Order Statistics,
DW08(293-302).
Springer DOI 0811
BibRef

Wahab, A.W.A.[Ainuddin Wahid Abdul], Briffa, J.A.[Johann A.], Schaathun, H.G.[Hans Georg],
On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography,
DW08(342-349).
Springer DOI 0811
BibRef

Li, T.[Ting], Zhao, Y.[Yao], Ni, R.R.[Rong-Rong], Yu, L.F.[Li-Fang],
A High Capacity Steganographic Algorithm in Color Images,
DW08(218-228).
Springer DOI 0811
BibRef

Islam, N.[Naveed], Puech, W.[William], Brouzet, R.[Robert],
A Homomorphic Method for Sharing Secret Images,
DW09(121-135).
Springer DOI 0908
BibRef

Zheng, X.L.[Xue-Ling], Huang, L.S.[Liu-Sheng], Chen, Z.[Zhili], Yu, Z.S.[Zhen-Shan], Yang, W.[Wei],
Hiding Information by Context-Based Synonym Substitution,
DW09(162-169).
Springer DOI 0908
BibRef

Kim, S.[Semin], de Neve, W.[Wesley], Ro, Y.M.[Yong Man],
A Statistical and Iterative Method for Data Hiding in Palette-Based Images,
DW09(170-183).
Springer DOI 0908
BibRef

Agrawal, N.[Neha], Savvides, M.[Marios],
Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching,
Biometrics09(85-92).
IEEE DOI 0906
BibRef

Shyu, S.J.[Shyong Jian], Chuang, C.C.[Chun-Chieh], Chen, Y.R.[Ying-Ru], Lai, A.F.[Ah-Fur],
Weighted Threshold Secret Image Sharing,
PSIVT09(988-998).
Springer DOI 0901
BibRef

Sur, A.[Arijit], Goel, P.[Piyush], Mukhopadhyay, J.[Jayanta],
A New Approach for Reducing Embedding Noise in Multiple Bit Plane Steganography,
ICISP08(580-587).
Springer DOI 0807
BibRef

Kang, X.G.[Xian-Gui], Zhong, X.[Xiong], Huang, J.W.[Ji-Wu], Zeng, W.J.[Wen-Jun],
An efficient print-scanning resilient data hiding scheme based on a novel LPM,
ICIP08(2080-2083).
IEEE DOI 0810
BibRef

Cheddad, A.[Abbas], Condell, J.[Joan], Curran, K.[Kevin], McKevitt, P.[Paul],
Enhancing Steganography in Digital Images,
CRV08(326-332).
IEEE DOI 0805
BibRef

Navas, K.A., Aravind, M.L., Sasi Kumar, M.,
A novel quality measure for information hiding in images,
Tensor08(1-5).
IEEE DOI 0806
BibRef

Perez-Gonzalez, F.[Fernando], Heileman, G.L.[Greg L.], Abdallah, C.T.[Chaouki T.],
Benford's Law in Image Processing,
ICIP07(I: 405-408).
IEEE DOI 0709
Apply to steganalysis. (Detection) (Benford: Lists of numbers by digit, the low digits dominate -- leading digit is most often 1) BibRef

Gou, H.M.[Hong-Mei], Wu, M.[Min],
Improving Embedding Payload in Binary Images with 'Super-Pixels',
ICIP07(III: 277-280).
IEEE DOI 0709
BibRef

Chen, C.H.[Chun-Hua], Shi, Y.Q.[Yun Q.], Xuan, G.R.[Guo-Rong],
Steganalyzing Texture Images,
ICIP07(II: 153-156).
IEEE DOI 0709
BibRef

Yu, X.Y.[Xiao-Yi], Zhu, X.S.[Xin-Shan], Babaguchi, N.[Noboru],
Steganography using Sensor Noise and Linear Prediction Synthesis Filter,
ICIP07(II: 157-160).
IEEE DOI 0709
BibRef

Sarkar, A., Manjunath, B.S.,
Estimating Steganographic Capacity for Odd-Even Based Embedding and its Use in Individual Compensation,
ICIP07(I: 409-412).
IEEE DOI 0709
BibRef

Smith, C.B.[Christopher B.],
Steganalysis using Noise Variance Estimation,
ICIP07(I: 417-420).
IEEE DOI 0709
BibRef

Zou, D.K.[De-Kun], Tian, J.[Jun], Bloom, J.A.[Jeffrey A.], Zhai, J.F.[Jie-Fu],
Data Hiding in Film Grain,
DW06(197-211).
Springer DOI 0611
BibRef

Kim, Y.H.[Youn-Hee], Duric, Z.[Zoran], Richards, D.[Dana],
Towards Lower Bounds on Embedding Distortion in Information Hiding,
DW06(362-376).
Springer DOI 0611
BibRef

Marçal, A.R.S.[André R.S.], Pereira, P.R.[Patricia R.],
A Steganographic Method for Digital Images Robust to RS Steganalysis,
ICIAR05(1192-1199).
Springer DOI 0509
BibRef

Lai, B.L.[Bo-Luen], Chang, L.W.[Long-Wen],
Adaptive Data Hiding for Images Based on Harr Discrete Wavelet Transform,
PSIVT06(1085-1093).
Springer DOI 0612
BibRef

Xuan, G.R.[Guo-Rong], Shi, Y.Q.[Yun Q.], Huang, C.[Cong], Fu, D.D.[Dong-Dong], Zhu, X.M.[Xiu-Ming], Chai, P.Q.[Pei-Qi], Gao, J.J.[Jian-Jiong],
Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA),
DW06(49-60).
Springer DOI 0611
BibRef

Nguyen, B.C.[Bui Cong], Yoon, S.M.[Sang Moon], Lee, H.K.[Heung-Kyu],
Multi Bit Plane Image Steganography,
DW06(61-70).
Springer DOI 0611
BibRef

Candan, C.,
A Transcoding Robust Data Hiding Method for Image Communication Applications,
ICIP05(III: 660-663).
IEEE DOI 0512
BibRef

Whelan, K.M., Silvestre, G.C.M., Hurley, N.J.,
Iterative Decoding of Scale Invariant Image Data-Hiding,
ICIP05(I: 989-992).
IEEE DOI 0512
BibRef

Yu, X.Y.[Xiao-Yi], Wang, Y.H.[Yun-Hong], Tan, T.N.[Tie-Niu],
Model based steganalysis,
ICIP04(IV: 2625-2628).
IEEE DOI 0505
BibRef

Solanki, K., Sullivan, K., Madhow, U., Manjunath, B.S., Chandrasekaran, S.,
Statistical Restoration for Robust and Secure Steganography,
ICIP05(II: 1118-1121).
IEEE DOI 0512
BibRef

Wang, X.F.[Xue-Feng], Yao, Z.[Zhen], Li, C.T.[Chang-Tsun],
A Palette-Based Image Steganographic Method Using Colour Quantisation,
ICIP05(II: 1090-1093).
IEEE DOI 0512
BibRef

del Rey, A.M.[A. Martín], Sánchez, G.R.[G. Rodríguez], de la Villa-Cuenca, A.,
A Protocol to Cipher Digital Images Based on Cat Maps and Cellular Automata,
IbPRIA07(I: 571-578).
Springer DOI 0706
BibRef

del Rey, A.M.[Angel Martín],
A Matrix-Based Secret Sharing Scheme for Images,
CIARP08(635-642).
Springer DOI 0809
BibRef
And:
A Secret Sharing Scheme for Digital Images Based on Two-Dimensional Linear Cellular Automata,
IWCIA08(xx-yy).
Springer DOI 0804
BibRef

Marańón, G.Á.[Gonzalo Álvarez], Encinas, L.H.[Luis Hernández], del Rey, Á.M.[Ángel Martín],
A New Secret Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata,
IbPRIA05(I:411).
Springer DOI 0509
BibRef

Jiang, M.[Ming], Wong, E., Memon, N., Wu, X.L.[Xiao-Lin],
A simple technique for estimating message lengths for additive noise steganography,
ICARCV04(II: 983-986).
IEEE DOI 0412
BibRef

Sattar, F., Yu, D.[Dan], Razul, S.G., Krishnan, S.M.,
Transparent information hiding with automatic embedding range selection for ownership verification,
ICIP04(IV: 2657-2660).
IEEE DOI 0505
BibRef

Amin, P., Subbalakshuni, K.P.,
Rotation and cropping resilient data hiding with zernike moments,
ICIP04(IV: 2175-2178).
IEEE DOI 0505
BibRef

Liu, N.[Ning], Subbalakshun, K.P.,
Non-uniform quantizer design for image data hiding,
ICIP04(IV: 2179-2182).
IEEE DOI 0505
BibRef

Xue, G.[Gang], Lu, P.Z.[Pei-Zhong], Wang, J.L.[Jin-Lian],
A Counter-Geometric Distortions Data Hiding Scheme Using Double Channels in Color Images,
DW04(42-54).
Springer DOI 0505
BibRef

Yu, J.J.[Jeong Jae], Jung, C.H.[Chang-Ho], Yoon, S.K.[Seok-Koo], Lee, S.J.[Sang-Jin],
Steganographic Scheme Using a Block Cipher,
DW04(163-170).
Springer DOI 0505
BibRef

Chandramouli, R.,
On information hiding with incomplete information about steganalysis,
ICIP04(II: 1161-1164).
IEEE DOI 0505
BibRef

Sullivan, K., Bi, Z., Madhow, U., Chandrosekaran, S., Manjunath, B.S.,
Steganalysis of quantization index modulation data hiding,
ICIP04(II: 1165-1168).
IEEE DOI 0505
BibRef

Chae, J.J., Mukherjee, D., Manjunath, B.S.,
Color image embedding using multidimensional lattice structures,
ICIP98(I: 460-464).
IEEE DOI 9810
BibRef

Gou, H.M.[Hong-Mei], Wu, M.[Min],
Data hiding in curves for collusion-resistant digital fingerprinting,
ICIP04(I: 51-54).
IEEE DOI 0505
BibRef

Jiang, M.[Ming], Memon, N., Wong, E., Wu, X.L.[Xiao-Lin],
Quantitative steganalysis of binary images,
ICIP04(I: 29-32).
IEEE DOI 0505
BibRef

Solanki, K., Madhow, U., Manjunath, B.S., Chandrasekaran, S.,
Estimating and undoing rotation for print-scan resilient data hiding,
ICIP04(I: 39-42).
IEEE DOI 0505
BibRef

Liu, T.H.[Tung-Hsiang], Chang, L.W.[Long-Wen],
An adaptive data hiding technique for binary images,
ICPR04(IV: 831-834).
IEEE DOI 0409
BibRef

Yu, X.Y.[Xiao-Yi], Wang, Y.H.[Yun-Hong], Tan, T.N.[Tie-Niu],
On estimation of secret message length in jsteg-like steganography,
ICPR04(IV: 673-676).
IEEE DOI 0409
BibRef

Yu, X.Y.[Xiao-Yi], Wang, Y.H.[Yun-Hong], Tan, T.N.[Tie-Niu],
Steganalysis of data hiding in binary images,
ICPR04(IV: 877-880).
IEEE DOI 0409
BibRef

Yi, Y.[Yu], Lee, M.H.[Moon Ho], Kim, J.H.[Ji Hyun], Hwang, G.Y.[Gi Yean],
Robust Wavelet-Based Information Hiding through Low-Density Parity-Check (LDPC) Codes,
DW03(117-128).
Springer DOI 0405
BibRef

Sion, R.[Radu], Atallah, M.[Mikhail], Prabhakar, S.I.[Sun-Il],
Resilient Information Hiding for Abstract Semi-structures,
DW03(141-153).
Springer DOI 0405
BibRef

Jung, Y.J.[Yong Ju], Kang, H.K.[Ho Kyung], Ro, Y.M.[Yong Man],
Metadata Hiding for Content Adaptation,
DW03(435-446).
Springer DOI 0405
BibRef

Yu, J.J.[Jeong Jae], Han, J.W.[Jae Won], Lee, K.S.[Kwang Su], O, S.C.[Seung Cheol], Lee, S.J.[Sang-Jin], Park, I.H.[Il Hwan],
A Secure Steganographic Scheme against Statistical Analyses,
DW03(497-507).
Springer DOI 0405
BibRef

Chang, K.[Kisik], Jung, C.H.[Chang-Ho], Lee, S.J.[Sang-Jin], Yang, W.[Wooil],
High Quality Perceptual Steganographic Techniques,
DW03(518-531).
Springer DOI 0405
BibRef

Sallee, P.[Phil],
Model-Based Steganography,
DW03(154-167).
Springer DOI 0405
BibRef

Thomos, N.T., Boulgouris, N.V., Simitopoulos, D.E., Strintzis, M.G.,
List Viterbi Decoding of Convolutional Codes for Efficient Data Hiding,
ICIP02(III: 461-464).
IEEE DOI 0210
BibRef

Pérez-González, F.[Fernando],
The Importance of Aliasing in Structured Quantization Index Modulation Data Hiding,
DW03(1-17).
Springer DOI 0405
BibRef

Perez-Gonzalez, F., Balado, F.,
Quantized projection data hiding,
ICIP02(II: 889-892).
IEEE DOI 0210
BibRef

Farid, H.,
Detecting hidden messages using higher-order statistical models,
ICIP02(II: 905-908).
IEEE DOI 0210
BibRef

Lin, C.Y., Chang, S.F.,
Zero-error Information Hiding Capacity of Digital Images,
ICIP01(III: 1007-1010).
IEEE DOI 0108
BibRef

Silvestre, G.,
Embedding Data in Digital Images Using CDMA Techniques,
ICIP00(Vol I: 589-592).
IEEE DOI 0008
BibRef

Masry, M.A., Ramos, M., Hemami, S.S.,
Robust Data Hiding Using Psychovisual Thresholding,
ICIP00(Vol I: 593-596).
IEEE DOI 0008
BibRef

Ding, W.[Wei], Yan, W.Q.[Wei-Qi], Qi, D.X.[Dong-Xu],
A Novel Digital Image Hiding Technology Based on Tangram and Conway's Game,
ICIP00(Vol I: 601-604).
IEEE DOI 0008
BibRef

Alturki, F.T.[Faisal T.], Mersereauu, R.M.[Russell M.],
Secure Blind Image Steganographic Technique Using Discrete Fourier Transformation,
ICIP01(II: 542-545).
IEEE DOI 0108
BibRef

Sehgal, A., Jagmohan, A., Ahuja, N.,
High Capacity Data Embedding in the Wavelet Domain,
ICIP01(III: 979-982).
IEEE DOI 0108
BibRef

Ramkumar, M.[Mahalingam], Akansu, A.N.[Ali N.], Alatan, A.A.[A. Aydin],
A Robust Data Hiding Scheme for Images Using DFT,
ICIP99(II:211-215).
IEEE DOI BibRef 9900

Fleet, D.J., and Heeger, D.,
Embedding Invisible Information in Color Images,
ICIP97(I: 532-535).
IEEE DOI
PS File. BibRef 9700

Hsu, C.T.[Chiou-Ting], Wu, J.L.[Ja-Ling],
Hidden signatures in images,
ICIP96(III: 223-226).
IEEE DOI 9610
BibRef

Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Data Hiding, Steganography, Random Grids, Random Dots .


Last update:Oct 22, 2024 at 22:09:59