23.3.9.4 Surveys, Image Hiding, Data Hiding, Steganography

Chapter Contents (Back)
Survey, Steganography. Survey, Watermark. Watermark. Watermark, Survey.

Johnson, N.F.[Neil F.], Jajodia, S.[Sushil],
Exploring Steganography: Seeing the Unseen,
Computer(31), No. 2, February 1998, pp. 26-34. Survey, Steganography. Discussion of various available tools for hiding text (and other information) in images. BibRef 9802

Brown, A.,
S-Tools for Windows,
Online Book1998.
WWW Link. Steganography tools to download BibRef 9800

Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.,
Information hiding: A survey,
PIEEE(87), No. 7, July 1999, pp. 1062-1078.
IEEE DOI 9907
Survey, Steganography. BibRef

Pérez-González, F.[Fernando], Hernández, J.R.[Juan R.], Balado, F.[Félix],
Approaching the Capacity Limit in Image Watermarking: A Perspective on Coding Techniques for Data Hiding Applications,
SP(81), No. 6, June 2001, pp. 1215-1238.
Elsevier DOI 0106
BibRef

Barni, M.[Mauro], Bartolini, F.[Franco], Fridrich, J.[Jessica],
Special Issue: Emerging Applications of Multimedia Data Hiding,
JASP(2002), No. 2, 2002, pp. 123-125. 0202
BibRef

Moulin, P., Mihcak, M.K.,
A framework for evaluating the data-hiding capacity of image sources,
IP(11), No. 9, September 2002, pp. 1029-1042.
IEEE DOI 0210
Evaluation, Watermark. BibRef

Mihcak, M.K., Moulin, P.,
Information embedding codes matched to locally stationary gaussian image models,
ICIP02(II: 137-140).
IEEE DOI 0210
BibRef

Moulin, P., Mihcak, M.K., Lin, G.I.,
An Information-theoretic Model for Image Watermarking and Data Hiding,
ICIP00(Vol III: 667-670).
IEEE DOI 0008
BibRef

Martin, A., Sapiro, G., Seroussi, G.,
Is Image Steganography Natural?,
IP(14), No. 12, December 2005, pp. 2040-2050.
IEEE DOI 0512
BibRef

Alturki, F.T.[Faisal T.], Almutairi, A.F.[Ali F.], Mersereauu, R.M.[Russell M.],
Analysis of blind data hiding using discrete cosine transform phase modulation,
SP:IC(22), No. 4, April 2007, pp. 347-362.
Elsevier DOI 0704
Data hiding; Blind digital watermarking; Data embedding capacity; Bit error rate BibRef

Ker, A.D.,
A Capacity Result for Batch Steganography,
SPLetters(14), No. 8, August 2007, pp. 525-528.
IEEE DOI 0709
BibRef

Paulson, L.D.[Linda Dailey],
Steganography Development Offers Promise,
Computer(43), No. 6, June 2010, pp. 18-21.
IEEE DOI 1007
BibRef

Böhme, R.[Rainer],
Advanced Statistical Steganalysis,
Springer2010, ISBN: 978-3-642-14312-0
WWW Link. Buy this book: Advanced Statistical Steganalysis (Information Security and Cryptography) 1010
BibRef

Cimato, S.[Stelvio], Yang, C.N.[Ching-Nung], (Eds.)
Visual Cryptography and Secret Image Sharing,
CRC PressJuly 15, 2011 ISBN: 9781439837214
WWW Link. Buy this book: Visual Cryptography and Secret Image Sharing (Digital Imaging and Computer Vision) 1106
BibRef

Iwamura, K.[Keiichi], Kawamura, M.[Masaki], Kuribayashi, M.[Minoru], Iwata, M.[Motoi], Kang, H.[Hyunho], Gohshi, S.[Seiichi], Nishimura, A.[Akira],
Information Hiding and Its Criteria for Evaluation,
IEICE(E100-D), No. 1, January 2017, pp. 2-12.
WWW Link. 1701
BibRef

Satchidanandan, B., Kumar, P.R.,
Dynamic Watermarking: Active Defense of Networked Cyber-Physical Systems,
PIEEE(105), No. 2, February 2017, pp. 219-240.
IEEE DOI 1702
actuators BibRef

Tang, W., Tan, S., Li, B., Huang, J.,
Automatic Steganographic Distortion Learning Using a Generative Adversarial Network,
SPLetters(24), No. 10, October 2017, pp. 1547-1551.
IEEE DOI 1710
steganography, automatic steganographic distortion learning, BibRef

Girdhar, A.[Ashish], Kumar, V.[Vijay],
Comprehensive survey of 3D image steganography techniques,
IET-IPR(12), No. 1, January 2018, pp. 1-10.
DOI Link 1712
BibRef
And: Erratum: IET-IPR(12), No. 4, April 2018, pp. 619-619.
DOI Link 1804
BibRef

Kim, C., Chang, C.C., Yang, C.N., Zhang, X., Baek, J.,
Special Issue: Real-Time Data Hiding and Visual Cryptography,
RealTimeIP(14), No. 1, January 2018, pp. 1-4.
WWW Link. 1802
BibRef

Hussain, M.[Mehdi], Wahab, A.W.A.[Ainuddin Wahid Abdul], Idris, Y.I.B.[Yamani Idna Bin], Ho, A.T.S.[Anthony T.S.], Jung, K.H.[Ki-Hyun],
Image steganography in spatial domain: A survey,
SP:IC(65), 2018, pp. 46-66.
Elsevier DOI 1805
Image steganography, Spatial domain steganography, Adaptive steganography, Data hiding, Security, Digital spatial domain BibRef


Li, Z., Beugnon, S., Puech, W., Bors, A.G.,
Rethinking the high capacity 3D steganography:\ Increasing its resistance to steganalysis,
ICIP17(510-414)
IEEE DOI 1803
Data mining, Distortion, Face, Image edge detection, Mathematical model, Resistance, steganalysis BibRef

Cerkez, P.S.,
Do you see what I see?,
AIPR13(1-7)
IEEE DOI 1408
Steganography. BibRef

Fridrich, J.[Jessica],
Modern Trends in Steganography and Steganalysis,
IWDW11(1).
Springer DOI 1208
Keynote, overview talk. BibRef

Rajput, G.K., Agrawal, R.K.,
Evaluation of Feature Selection Measures for Steganalysis,
PReMI09(432-439).
Springer DOI 0912
BibRef

Dominguez-Conde, G.[Gabriel], Comesana, P.[Pedro], Perez-Gonzalez, F.[Fernando],
Perfomance analysis of the Fridrich-Goljan self-embedding authentication method,
ICIP09(1253-1256).
IEEE DOI 0911
BibRef

Ker, A.D.[Andrew D.],
Estimating the Information Theoretic Optimal Stego Noise,
DW09(184-198).
Springer DOI 0908
BibRef

Cox, I.J.[Ingemar J.],
Data Hiding and the Statistics of Images,
DW09(1).
Springer DOI 0908
Overview paper. BibRef

Huang, F.J.[Fang-Jun], Shi, Y.Q.[Yun Q.], Huang, J.W.[Ji-Wu],
A study on security performance of YASS,
ICIP08(2084-2087).
IEEE DOI 0810
Yet another steganograpic system. BibRef

Rocha, A.[Anderson], Goldenstein, S.K.[Siome K.], Scheirer, W.J.[Walter J.], Boult, T.E.[Terrance E.],
The Unseen Challenge data sets,
WVU08(1-8).
IEEE DOI 0806
Dataset, Steganalysis. BibRef

Lee, S.K.[Sang-Kwang], Lim, S.J.[Seong-Jae], Suh, Y.H.[Young-Ho], Ho, Y.S.[Yo-Sung],
Lossless Data Hiding for Medical Images with Patient Information,
ICIP07(III: 253-256).
IEEE DOI 0709
BibRef

Westfeld, A.[Andreas],
Steganalysis in the Presence of Weak Cryptography and Encoding,
DW06(19-34).
Springer DOI 0611
BibRef

Lee, K.S.[Kwang-Soo], Westfeld, A.[Andreas], Lee, S.J.[Sang-Jin],
Category Attack for LSB Steganalysis of JPEG Images,
DW06(35-48).
Springer DOI 0611
BibRef

Ullerich, C.[Christian], Westfeld, A.[Andreas],
Weaknesses of MB2,
DW07(127-142).
Springer DOI 0712
BibRef

Chang, K.[Kisik], Deng, R.H.[Robert H.], Feng, B.[Bao], Lee, S.J.[Sang-Jin], Kim, H.J.[Hyung-Jun],
On Security Notions of Steganographic Systems,
DW04(137-151).
Springer DOI 0505
BibRef

Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Watermarks for Copyright, Ownership Protection, Authentication, Verification .


Last update:Aug 16, 2018 at 18:22:30