Johnson, N.F.[Neil F.],
Jajodia, S.[Sushil],
Exploring Steganography: Seeing the Unseen,
Computer(31), No. 2, February 1998, pp. 26-34.
Survey, Steganography. Discussion of various available tools for hiding text (and other information)
in images.
BibRef
9802
Brown, A.,
S-Tools for Windows,
Online Book1998.
WWW Link. Steganography tools to download
BibRef
9800
Petitcolas, F.A.P.,
Anderson, R.J.,
Kuhn, M.G.,
Information hiding: A survey,
PIEEE(87), No. 7, July 1999, pp. 1062-1078.
IEEE DOI
9907
Survey, Steganography.
BibRef
Pérez-González, F.[Fernando],
Hernández, J.R.[Juan R.],
Balado, F.[Félix],
Approaching the Capacity Limit in Image Watermarking:
A Perspective on Coding Techniques for Data Hiding Applications,
SP(81), No. 6, June 2001, pp. 1215-1238.
Elsevier DOI
0106
BibRef
Barni, M.[Mauro],
Bartolini, F.[Franco],
Fridrich, J.[Jessica],
Special Issue: Emerging Applications of Multimedia Data Hiding,
JASP(2002), No. 2, 2002, pp. 123-125.
0202
BibRef
Moulin, P.,
Mihcak, M.K.,
A framework for evaluating the data-hiding capacity of image sources,
IP(11), No. 9, September 2002, pp. 1029-1042.
IEEE DOI
0210
Evaluation, Watermark.
BibRef
Mihcak, M.K.,
Moulin, P.,
Information embedding codes matched to locally stationary gaussian
image models,
ICIP02(II: 137-140).
IEEE DOI
0210
BibRef
Moulin, P.,
Mihcak, M.K.,
Lin, G.I.,
An Information-theoretic Model for Image Watermarking and Data Hiding,
ICIP00(Vol III: 667-670).
IEEE DOI
0008
BibRef
Voloshynovskiy, S.[Sviatoslav],
Deguillaume, F.[Frederic],
Koval, O.[Oleksiy],
Pun, T.[Thierry],
Information-theoretic Data-hiding:
Recent Achievements And Open Problems,
IJIG(5), No. 1, January 2005, pp. 5-35.
0501
BibRef
Martin, A.,
Sapiro, G.,
Seroussi, G.,
Is Image Steganography Natural?,
IP(14), No. 12, December 2005, pp. 2040-2050.
IEEE DOI
0512
BibRef
Alturki, F.T.[Faisal T.],
Almutairi, A.F.[Ali F.],
Mersereauu, R.M.[Russell M.],
Analysis of blind data hiding using discrete cosine transform phase
modulation,
SP:IC(22), No. 4, April 2007, pp. 347-362.
Elsevier DOI
0704
Data hiding; Blind digital watermarking; Data embedding capacity;
Bit error rate
BibRef
Ker, A.D.,
A Capacity Result for Batch Steganography,
SPLetters(14), No. 8, August 2007, pp. 525-528.
IEEE DOI
0709
BibRef
Paulson, L.D.[Linda Dailey],
Steganography Development Offers Promise,
Computer(43), No. 6, June 2010, pp. 18-21.
IEEE DOI
1007
BibRef
Böhme, R.[Rainer],
Advanced Statistical Steganalysis,
Springer2010, ISBN: 978-3-642-14312-0
WWW Link.
Buy this book: Advanced Statistical Steganalysis (Information Security and Cryptography)
1010
BibRef
Cimato, S.[Stelvio],
Yang, C.N.[Ching-Nung], (Eds.)
Visual Cryptography and Secret Image Sharing,
CRC PressJuly 15, 2011
ISBN: 9781439837214
WWW Link.
Buy this book: Visual Cryptography and Secret Image Sharing (Digital Imaging and Computer Vision)
1106
BibRef
Zielinska, E.[Elzbieta],
Mazurczyk, W.[Wojciech],
Szczypiorski, K.[Krzysztof],
Trends in Steganography,
CACM(56), No. 3, March 2014, pp. 86-95.
DOI Link
1403
Survey, Steganography. Methods for embedding secret data are more sophisticated than their
ancient predecessors, but the basic principles remain unchanged.
BibRef
Tew, Y.[Yiqi],
Wong, K.S.[Kok-Sheik],
An Overview of Information Hiding in H.264/AVC Compressed Video,
CirSysVideo(24), No. 2, February 2014, pp. 305-319.
IEEE DOI
1403
data compression
BibRef
Wu, X.T.[Xiao-Tian],
Yang, C.N.[Ching-Nung],
A combination of color-black-and-white visual cryptography and
polynomial based secret image sharing,
JVCIR(61), 2019, pp. 74-84.
Elsevier DOI
1906
Visual cryptography, Secret image sharing, Color, Embedding,
Polynomial, Black and white
BibRef
Wu, X.T.[Xiao-Tian],
Yang, C.N.[Ching-Nung],
Probabilistic color visual cryptography schemes for black and white
secret images,
JVCIR(70), 2020, pp. 102793.
Elsevier DOI
2007
Visual cryptography, Probabilistic, Color, Black and white,
Pixel expansion, Secret image sharing
BibRef
Iwamura, K.[Keiichi],
Kawamura, M.[Masaki],
Kuribayashi, M.[Minoru],
Iwata, M.[Motoi],
Kang, H.[Hyunho],
Gohshi, S.[Seiichi],
Nishimura, A.[Akira],
Information Hiding and Its Criteria for Evaluation,
IEICE(E100-D), No. 1, January 2017, pp. 2-12.
WWW Link.
1701
BibRef
Satchidanandan, B.,
Kumar, P.R.,
Dynamic Watermarking: Active Defense of Networked Cyber-Physical
Systems,
PIEEE(105), No. 2, February 2017, pp. 219-240.
IEEE DOI
1702
actuators
BibRef
Girdhar, A.[Ashish],
Kumar, V.[Vijay],
Comprehensive survey of 3D image steganography techniques,
IET-IPR(12), No. 1, January 2018, pp. 1-10.
DOI Link
1712
BibRef
And:
Erratum:
IET-IPR(12), No. 4, April 2018, pp. 619-619.
DOI Link
1804
BibRef
Kim, C.,
Chang, C.C.,
Yang, C.N.,
Zhang, X.,
Baek, J.,
Special Issue: Real-Time Data Hiding and Visual Cryptography,
RealTimeIP(14), No. 1, January 2018, pp. 1-4.
WWW Link.
1802
BibRef
Hussain, M.[Mehdi],
Wahab, A.W.A.[Ainuddin Wahid Abdul],
Idris, Y.I.B.[Yamani Idna Bin],
Ho, A.T.S.[Anthony T.S.],
Jung, K.H.[Ki-Hyun],
Image steganography in spatial domain: A survey,
SP:IC(65), 2018, pp. 46-66.
Elsevier DOI
1805
Image steganography, Spatial domain steganography,
Adaptive steganography, Data hiding, Security, Digital spatial domain
BibRef
Tao, J.Y.[Jin-Yuan],
Li, S.[Sheng],
Zhang, X.P.[Xin-Peng],
Wang, Z.C.[Zi-Chi],
Towards Robust Image Steganography,
CirSysVideo(29), No. 2, February 2019, pp. 594-600.
IEEE DOI
1902
Transform coding, Image coding, Discrete cosine transforms,
Communication channels, Data mining, Distortion, Q-factor,
JPEG compression
BibRef
Giboulot, Q.,
Fridrich, J.,
Payload Scaling for Adaptive Steganography: An Empirical Study,
SPLetters(26), No. 9, September 2019, pp. 1339-1343.
IEEE DOI
1909
game theory, image coding, steganography, secret payload, cover size,
constant statistical detectability, steganographer,
adaptive embedding
BibRef
Chanu, O.B.[Oinam Bidyapati],
Neelima, A.[Arambam],
A survey paper on secret image sharing schemes,
MultInfoRetr(8), No. 4, December 2019, pp. 195-215.
WWW Link.
1912
Survey, Steganography.
BibRef
Wang, L.[Lina],
Xu, Y.[Yibo],
Zhai, L.M.[Li-Ming],
Ren, Y.Z.[Yan-Zhen],
Du, B.[Bo],
A posterior evaluation algorithm of steganalysis accuracy inspired by
residual co-occurrence probability,
PR(87), 2019, pp. 106-117.
Elsevier DOI
1812
Steganography, Steganalysis, Carrier security,
Adaptive convolution, Posterior accuracy
BibRef
Ruan, F.[Feng],
Zhang, X.[Xing],
Zhu, D.W.[Da-Wei],
Xu, Z.Y.[Zhan-Yang],
Wan, S.H.[Shao-Hua],
Qi, L.Y.[Lian-Yong],
Deep learning for real-time image steganalysis: a survey,
RealTimeIP(17), No. 1, February 2020, pp. 149-160.
Springer DOI
2002
Survey, Steganalysis.
BibRef
Arivazhagan, S.[Selvaraj],
Amrutha, E.[Ezhilarasan],
Wellington, S.L.J.[Sylvia Lilly Jebarani],
Sam, A.R.[Ananthi Roy],
Digital image steganalysis: A survey on paradigm shift from machine
learning to deep learning based techniques,
IET-IPR(15), No. 2, 2021, pp. 504-522.
DOI Link
2106
BibRef
Puteaux, P.[Pauline],
Ong, S.Y.[Sim-Ying],
Wong, K.[Kok_Sheik],
Puech, W.[William],
A survey of reversible data hiding in encrypted images: The first 12
years,
JVCIR(77), 2021, pp. 103085.
Elsevier DOI
2106
Survey, Reversible Data Hiding. Multimedia security, Image encryption, Data hiding,
Signal processing in the encrypted domain
BibRef
Arivazhagan, S.[Selvaraj],
Amrutha, E.[Ezhilarasan],
Wellington, S.L.J.[Sylvia Lilly Jebarani],
Universal steganalysis of spatial content-independent and
content-adaptive steganographic algorithms using normalized feature
derived from empirical mode decomposed components,
SP:IC(101), 2022, pp. 116567.
Elsevier DOI
2201
Universal steganalysis, Empirical mode decomposition,
Majority voting, Least significant bit algorithms, Content-adaptive algorithms
BibRef
Ishizuka, H.[Hirokazu],
Echizen, I.[Isao],
Iwamura, K.[Keiichi],
Sakurai, K.[Koichi],
Evaluation of a Zero-Watermarking-Type Steganography,
IWDW14(613-624).
Springer DOI
1602
BibRef
Cerkez, P.S.,
Do you see what I see?,
AIPR13(1-7)
IEEE DOI
1408
Steganography.
BibRef
Fridrich, J.[Jessica],
Modern Trends in Steganography and Steganalysis,
IWDW11(1).
Springer DOI
1208
Keynote, overview talk.
BibRef
Rajput, G.K.,
Agrawal, R.K.,
Evaluation of Feature Selection Measures for Steganalysis,
PReMI09(432-439).
Springer DOI
0912
BibRef
Dominguez-Conde, G.[Gabriel],
Comesana, P.[Pedro],
Perez-Gonzalez, F.[Fernando],
Perfomance analysis of the Fridrich-Goljan self-embedding
authentication method,
ICIP09(1253-1256).
IEEE DOI
0911
BibRef
Ker, A.D.[Andrew D.],
Estimating the Information Theoretic Optimal Stego Noise,
DW09(184-198).
Springer DOI
0908
BibRef
Cox, I.J.[Ingemar J.],
Data Hiding and the Statistics of Images,
DW09(1).
Springer DOI
0908
Overview paper.
BibRef
Huang, F.J.[Fang-Jun],
Shi, Y.Q.[Yun Q.],
Huang, J.W.[Ji-Wu],
A study on security performance of YASS,
ICIP08(2084-2087).
IEEE DOI
0810
Yet another steganograpic system.
BibRef
Rocha, A.[Anderson],
Goldenstein, S.K.[Siome K.],
Scheirer, W.J.[Walter J.],
Boult, T.E.[Terrance E.],
The Unseen Challenge data sets,
WVU08(1-8).
IEEE DOI
0806
Dataset, Steganalysis.
BibRef
Lee, S.K.[Sang-Kwang],
Lim, S.J.[Seong-Jae],
Suh, Y.H.[Young-Ho],
Ho, Y.S.[Yo-Sung],
Lossless Data Hiding for Medical Images with Patient Information,
ICIP07(III: 253-256).
IEEE DOI
0709
BibRef
Westfeld, A.[Andreas],
Steganalysis in the Presence of Weak Cryptography and Encoding,
DW06(19-34).
Springer DOI
0611
BibRef
Lee, K.S.[Kwang-Soo],
Westfeld, A.[Andreas],
Lee, S.J.[Sang-Jin],
Category Attack for LSB Steganalysis of JPEG Images,
DW06(35-48).
Springer DOI
0611
BibRef
Ullerich, C.[Christian],
Westfeld, A.[Andreas],
Weaknesses of MB2,
DW07(127-142).
Springer DOI
0712
BibRef
Chang, K.[Kisik],
Deng, R.H.[Robert H.],
Feng, B.[Bao],
Lee, S.J.[Sang-Jin],
Kim, H.J.[Hyung-Jun],
On Security Notions of Steganographic Systems,
DW04(137-151).
Springer DOI
0505
BibRef
Abdulaziz, N.,
Pang, K.,
Performance Evaluation of Data Hiding System Using Wavelet Transform
and Error-control Coding,
ICIP00(Vol I: 605-608).
IEEE DOI
0008
BibRef
Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Steganalysis for Text, Documents .