25.3.11.7 Halftone Images, Compressed Images: Image Hiding, Data Hiding, Steganography

Chapter Contents (Back)
Steganography. Image Compression. Compressed Images. Halftone.
See also Reversible Data Hiding, Steganography.
See also Reversible Data Hiding for JPEG, Steganography.
See also Watermarks in Halftone Images.
See also Video Data Hiding, Data Hiding in Video, Video Steganography.

Chung, K.L.[Kuo-Liang], Shen, C.H.[Chao-Hui], Chang, L.C.[Lung-Chun],
A novel SVD- and VQ-based image hiding scheme,
PRL(22), No. 9, July 2001, pp. 1051-1058.
Elsevier DOI 0106
BibRef

Fu, M.S.[Ming Sun], Au, O.C.[Oscar C.],
Halftone image data hiding with intensity selection and connection selection,
SP:IC(16), No. 10, August 2001, pp. 909-930.
Elsevier DOI 0001
Data hiding; Watermark; Halftone image; Intensity; Connection; Selection; Toggling; Eccentricity; Inverse halftoning; Error diffusion; Dithering BibRef

Ramkumar, M., Akansu, A.N.,
Capacity estimates for data hiding in compressed images,
IP(10), No. 8, August 2001, pp. 1252-1263.
IEEE DOI 0108
BibRef

Spaulding, J.[Jeremiah], Noda, H.[Hideki], Shirazi, M.N.[Mahdad N.], Kawaguchi, E.[Eiji],
BPCS steganography using EZW lossy compressed images,
PRL(23), No. 13, November 2002, pp. 1579-1587.
Elsevier DOI 0206
BibRef

Noda, H., Spaulding, J., Shirazi, M.N., Kawaguchi, E.,
Application of bit-plane decomposition steganography to JPEG2000 encoded images,
SPLetters(9), No. 12, December 2002, pp. 410-413.
IEEE Top Reference. 0301
BibRef

Niimi, M., Nakamura, T., Noda, H.,
Application of Complexity Measure to Reversible Information Hiding,
ICIP06(113-116).
IEEE DOI 0610
BibRef

Noda, H., Spaulding, J., Shirazi, M.N., Niimi, M., Kawaguchi, E.,
Application of bit-plane decomposition steganography to wavelet encoded images,
ICIP02(II: 909-912).
IEEE DOI 0210
BibRef

Chang, C.C., Chuang, J.C., Lai, Y.P.,
Hiding data in multitone images for data communications,
VISP(151), No. 2, April 2004, pp. 137-145.
IEEE Abstract. 0406
BibRef

Chang, C.C.[Chin-Chen], Chen, G.M.[Guei-Mei], Lin, M.H.[Min-Hui],
Information hiding based on search-order coding for VQ indices,
PRL(25), No. 11, August 2004, pp. 1253-1261.
Elsevier DOI 0409
BibRef

Chang, C.C.[Chin-Chen], Tseng, H.W.[Hsien-Wen],
A steganographic method for digital images using side match,
PRL(25), No. 12, September 2004, pp. 1431-1437.
Elsevier DOI 0409
BibRef

Lu, T.C.[Tzu-Chuen], Chang, C.C.[Chin-Chen],
Lossless nibbled data embedding scheme based on difference expansion,
IVC(26), No. 5, May 2008, pp. 632-638.
Elsevier DOI 0803
Lossless data embedding; Difference expansion; Nibble; Arithmetic coding; Prediction by partial matching BibRef

Chang, C.C.[Chin-Chen], Lin, C.Y.[Chih-Yang], Fan, Y.H.[Yi-Hsuan],
Lossless data hiding for color images based on block truncation coding,
PR(41), No. 7, July 2008, pp. 2347-2357.
Elsevier DOI 0804

See also extended difference expansion algorithm for reversible watermarking, An. Reversible data hiding; Steganography; Block truncation coding (BTC); Genetic algorithm (GA) BibRef

Chen, K.M.[Kai-Meng], Chang, C.C.[Chin-Chen],
High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement,
JVCIR(58), 2019, pp. 334-344.
Elsevier DOI 1901
Reversible data hiding, Run-length coding, Image encryption BibRef

Gao, K.[Kai], Horng, J.H.[Ji-Hwei], Chang, C.C.[Chin-Chen],
High-capacity reversible data hiding in encrypted images based on adaptive block encoding,
JVCIR(84), 2022, pp. 103481.
Elsevier DOI 2204
Encrypted image, Data hiding, Adaptive block encoding, Embedding capacity BibRef

Lin, C.C.[Chia-Chen], Tai, W.L.[Wei-Liang], Chang, C.C.[Chin-Chen],
Multilevel Reversible Data Hiding Based on Histogram Modification of Difference Images,
PR(41), No. 12, December 2008, pp. 3582-3591.
Elsevier DOI 0810
Data hiding; Multilevel hiding strategy; Reversibility; Histogram BibRef

Wang, X.[Xu], Chang, C.C.[Ching-Chun], Lin, C.C.[Chia-Chen], Chang, C.C.[Chin-Chen],
On the multi-level embedding of crypto-image reversible data hiding,
JVCIR(87), 2022, pp. 103556.
Elsevier DOI 2208
Reversible data hiding, Encrypted images, Multi-Level, Block mapping, Very high embedding capacity BibRef

Tai, W.L.[Wei-Liang], Yeh, C.M., Chang, C.C.[Chin-Chen],
Reversible Data Hiding Based on Histogram Modification of Pixel Differences,
CirSysVideo(19), No. 6, June 2009, pp. 906-910.
IEEE DOI 0906
BibRef

Su, G.D.[Guo-Dong], Chang, C.C.[Chin-Chen], Lin, C.C.[Chia-Chen], Yao, Z.Q.[Zhi-Qiang],
Secure high capacity tetris-based scheme for data hiding,
IET-IPR(14), No. 17, 24 December 2020, pp. 4633-4645.
DOI Link 2104
BibRef
And: Erratum: IET-IPR(15), No. 12, 2021, pp. 3020-3020.
DOI Link 2109
BibRef

Nguyen, T.S.[Thai-Son], Chang, C.C.[Chin-Chen], Chang, W.C.[Wen-Chi],
High capacity reversible data hiding scheme for encrypted images,
SP:IC(44), No. 1, 2016, pp. 84-91.
Elsevier DOI 1605
Data hiding BibRef

Chen, C.C.[Chih-Cheng], Chang, C.C.[Chin-Chen], Chen, K.M.[Kai-Meng],
High-capacity reversible data hiding in encrypted image based on Huffman coding and differences of high nibbles of pixels,
JVCIR(76), 2021, pp. 103060.
Elsevier DOI 2104
Reversible data hiding, Image encryption, Huffman coding, High nibble BibRef

Lin, P.Y.[Pei-Yu], Lee, J.S.[Jung-San], Chang, C.C.[Chin-Chen],
Distortion-free secret image sharing mechanism using modulus operator,
PR(42), No. 5, May 2009, pp. 886-895.
Elsevier DOI 0902
Secret sharing; Distortion-free; Rabin's signature; Modulus operator; Cheater detection BibRef

Chang, C.C.[Chin-Chen], Lin, C.C.[Chia-Chen], Le, T.H.N.[T. Hoang Ngan], Le, H.B.[Hoai Bac],
Sharing a verifiable secret image using two shadows,
PR(42), No. 11, November 2009, pp. 3097-3114.
Elsevier DOI 0907
Visual secret sharing; Error diffusion; Inverse halftoning; (7, 4) Hamming code; Verifiable secret image; Clustering BibRef

Huynh, N.T.[Ngoc-Tu], Bharanitharan, K., Chang, C.C.[Chin-Chen],
Quadri-directional searching algorithm for secret image sharing using meaningful shadows,
JVCIR(28), No. 1, 2015, pp. 105-112.
Elsevier DOI 1503
Secret image sharing BibRef

Chang, C.C.[Chin-Chen], Liu, Y., Wu, H.L.,
Distortion-free secret image sharing method with two meaningful shadows,
IET-IPR(10), No. 8, 2016, pp. 590-597.
DOI Link 1608
image reconstruction BibRef

Qin, C.[Chuan], Chang, C.C.[Chin-Chen], Liao, L.T.[Li-Ting],
An adaptive prediction-error expansion oriented reversible information hiding scheme,
PRL(33), No. 16, 1 December 2012, pp. 2166-2172.
Elsevier DOI 1210
Reversible data hiding; Prediction-error expansion; Embedding rate; Visual quality BibRef

Noda, H.[Hideki], Niimi, M.[Michiharu], Kawaguchi, E.[Eiji],
High-performance JPEG steganography using quantization index modulation in DCT domain,
PRL(27), No. 5, 1 April 2006, pp. 455-461.
Elsevier DOI 0604
BibRef
Earlier:
Application of QIM with Dead Zone for Histogram Preserving JPEG Steganography,
ICIP05(II: 1082-1085).
IEEE DOI 0512
Information security; Quantization index modulation; Histogram matching BibRef

Niimi, M., Ei, T., Noda, H., Kawaguchi, E., Segee, B.,
An attack to BPCS-steganography using complexity histogram and countermeasure,
ICIP04(II: 733-736).
IEEE DOI 0505
BibRef

Niimi, M., Noda, H., Kawaguchi, E., Eason, R.O.,
Luminance quasi-preserving color quantization for digital steganography to palette-based images,
ICPR02(I: 251-254).
IEEE DOI 0211
BibRef
And:
High capacity and secure digital steganography to palette-based images,
ICIP02(II: 917-920).
IEEE DOI 0210
BibRef

Noda, H., Furuta, T., Niimi, M., Kawaguchi, E.,
Application of BPCS steganography to wavelet compressed video,
ICIP04(IV: 2147-2150).
IEEE DOI 0505
BibRef

Niimi, M.[Michiharu], Noda, H.[Hideki], Segee, B.[Bruce],
A Study on Visual Attack to BPCS-Steganography and Countermeasure,
VLBV05(29-36).
Springer DOI 0509
BibRef

Campisi, P.[Patrizio], Kundur, D.[Deepa], Hatzinakos, D.[Dimitrios], Neri, A.[Alessandro],
Compressive Data Hiding: An Unconventional Approach for Improved Color Image Coding,
JASP(2002), No. 2, 2002, pp. 152-163. 0202
BibRef

Wu, C.W.[Chai Wah],
Multimedia Data Hiding and Authentication via Halftoning and Coordinate Projection,
JASP(2002), No. 2, 2002, pp. 143-151. 0202
BibRef

Maniccam, S.S., Bourbakis, N.,
Lossless compression and information hiding in images,
PR(37), No. 3, March 2004, pp. 475-486.
Elsevier DOI 0401
BibRef

Chrysos, G.[Grigorios], Dollas, A.[Apostolos], Bourbakis, N.[Nikolaos],
Architecture and design of an embeddable system for SCAN-based compression, encryption and information hiding,
RealTimeIP(2), No. 4, December 2007, pp. 207-222.
Springer DOI 0712
BibRef

Fung, Y.H.[Yik-Hing], Chan, Y.H.[Yuk-Hee],
Embedding halftones of different resolutions in a full-scale halftone,
SPLetters(13), No. 3, March 2006, pp. 153-156.
IEEE DOI 0604
BibRef

Chang, C.C., Wu, W.C.,
Hiding secret data adaptively in vector quantisation index tables,
VISP(153), No. 5, October 2006, pp. 589-597.
DOI Link 0702
BibRef

Liu, C.L.[Chiang-Lung], Liao, S.R.[Shiang-Rong],
High-performance JPEG steganography using complementary embedding strategy,
PR(41), No. 9, September 2008, pp. 2945-2955.
Elsevier DOI 0806
Image hiding; JPEG steganography; Chi-square family attack; S family attack; Statistical steganalysis; Complementary embedding BibRef

Gul, G., Dirik, A.E., Avcibas, I.[Ismail],
Steganalytic Features for JPEG Compression-Based Perturbed Quantization,
SPLetters(14), No. 3, March 2007, pp. 205-208.
IEEE DOI 0703

See also Image Steganalysis with Binary Similarity Measures. BibRef

Shie, S.C.[Shih-Chieh], Lin, S.D.[Shinfeng D.],
Secret image transmission based on VQ and data embedding,
IJIST(17), No. 1, 2007, pp. 1-9.
DOI Link 0707
BibRef

Kapotas, S.K.[Spyridon K.], Skodras, A.N.[Athanassios N.],
Real time data hiding by exploiting the IPCM macroblocks in H.264/AVC streams,
RealTimeIP(4), No. 1, March 2009, pp. xx-yy.
Springer DOI 0903
BibRef

Zhang, L., Wang, H., Wu, R.,
A High-Capacity Steganography Scheme for JPEG2000 Baseline System,
IP(18), No. 8, August 2009, pp. 1797-1803.
IEEE DOI 0907
BibRef

Yang, C.H.[Cheng-Hsing], Weng, C.Y.[Chi-Yao], Wang, S.J.[Shiuh-Jeng], Sun, H.M.[Hung-Min],
Grouping strategies for promoting image quality of watermarking on the basis of vector quantization,
JVCIR(21), No. 1, January 2010, pp. 49-55.
Elsevier DOI 1002
Vector quantization; Watermarking; Image quality; Copyright protection; Robustness; Stego-image; Bipartite-matching; Peak-signal-noise-ratio BibRef

Phadikar, A.[Amit], Maity, S.P.[Santi P.],
ROI Based Quality Access Control of Compressed Color Image using DWT via Lifting,
ELCVIA(8), No. 2, July 2009, pp. xx-yy.
DOI Link 1002
BibRef

Phadikar, A.[Amit], Maity, S.P.[Santi P.],
Data hiding based quality access control of digital images using adaptive QIM and lifting,
SP:IC(26), No. 10, November 2011, pp. 646-661.
Elsevier DOI 1111
Data hiding; Data modulation; Access control; Security; Lifting; QIM BibRef

Phadikar, A.[Amit], Maity, S.P.[Santi P.], Mandal, M.[Mrinal],
Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images,
JVCIR(23), No. 3, April 2012, pp. 454-466.
Elsevier DOI 1203
Semi-fragile watermarking; Data hiding; Tamper detection; Tamper correction; Quantization index modulation; Wavelets; Integer wavelets; Image half-toning BibRef

Phadikar, A.[Amit], Maity, S.P.[Santi P.], Kundu, M.K.[Malay K.],
Quantization Based Data Hiding Scheme for Efficient Quality Access Control of Images Using DWT via Lifting,
ICCVGIP08(265-272).
IEEE DOI 0812
BibRef

Zhang, J., Zhang, D.,
Detection of LSB Matching Steganography in Decompressed Images,
SPLetters(17), No. 2, February 2010, pp. 141-144.
IEEE DOI 0912
BibRef

Amat, P., Puech, W., Druon, S., Pedeboy, J.P.,
Lossless 3D steganography based on MST and connectivity modification,
SP:IC(25), No. 6, July 2010, pp. 400-412.
Elsevier DOI 1007
Data hiding; Steganography; Watermarking; 3D triangular mesh; Quadruple; Graph scanning BibRef

Beugnon, S., Puech, W., Pedeboy, J.P.,
Format-Compliant Selective Secret 3-D Object Sharing Scheme,
MultMed(21), No. 9, September 2019, pp. 2171-2183.
IEEE DOI 1909
Image reconstruction, Distortion, Encryption, Geometry, Interpolation, 3D selective encryption, content protection BibRef

Bulan, O.[Orhan], Sharma, G.[Gaurav], Monga, V.[Vishal],
Orientation Modulation for Data Hiding in Clustered-Dot Halftone Prints,
IP(19), No. 8, August 2010, pp. 2070-2084.
IEEE DOI 1008
BibRef
Earlier:
Adaptive decoding for halftone orientation-based data hiding,
ICIP08(1280-1283).
IEEE DOI 0810

See also High Capacity Color Barcodes: Per Channel Data Encoding via Orientation Modulation in Elliptical Dot Arrays. BibRef

Bulan, O.[Orhan], Monga, V.[Vishal], Sharma, G.[Gaurav],
Capacity Analysis For Orthogonal Halftone Orientation Modulation Channels,
IP(21), No. 1, January 2012, pp. 405-411.
IEEE DOI 1112
BibRef

Seo, Y.H.[Young-Ho], Choi, H.J.[Hyun-Jun], Yoo, J.S.[Ji-Sang], Kim, D.W.[Dong-Wook],
Selective and adaptive signal hiding technique for security of JPEG2000,
IJIST(20), No. 3, September 2010, pp. 277-284.
DOI Link 1008
BibRef

Wang, Y.[Yong], Liu, J.[Jiufen], Zhang, W.M.[Wei-Ming], Lian, S.[Shiguo],
Reliable JPEG steganalysis based on multi-directional correlations,
SP:IC(25), No. 8, September 2010, pp. 577-587.
Elsevier DOI 1003
Steganography; Steganalysis; Calibration; Multi-directions; Analysis of variance; Support vector machine BibRef

Luo, W.Q.[Wei-Qi], Wang, Y.G.[Yuan-Gen], Huang, J.W.[Ji-Wu],
Security Analysis on Spatial +/- 1 Steganography for JPEG Decompressed Images,
SPLetters(18), No. 1, January 2011, pp. 39-42.
IEEE DOI 1101
BibRef

Keskinarkaus, A.[Anja], Pramila, A.[Anu], Seppänen, T.[Tapio],
Image watermarking with feature point based synchronization robust to print-scan attack,
JVCIR(23), No. 3, April 2012, pp. 507-515.
Elsevier DOI 1203
BibRef
Earlier: A2, A1, A3:
Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding,
DW07(279-293).
Springer DOI 0712
Feature points; Second generation watermarking; Multibit watermarking; Periodic patterns; Geometrical attacks; Print-scan attack; Compound attacks; Synchronization BibRef

Pramila, A.[Anu], Keskinarkaus, A.[Anja], Seppänen, T.[Tapio],
Toward an interactive poster using digital watermarking and a mobile phone camera,
SIViP(6), No. 2, June 2012, pp. 211-222.
WWW Link. 1205
BibRef

Keskinarkaus, A.[Anja], Pramila, A.[Anu], Seppänen, T.[Tapio], Sauvola, J.[Jaakko],
Wavelet Domain Print-Scan and JPEG Resilient Data Hiding Method,
DW06(82-95).
Springer DOI 0611
BibRef

Li, F.Y.[Feng-Yong], Zhang, X.P.[Xin-Peng], Chen, B.[Bin], Feng, G.R.[Guo-Rui],
JPEG Steganalysis With High-Dimensional Features and Bayesian Ensemble Classifier,
SPLetters(20), No. 3, March 2013, pp. 233-236.
IEEE DOI 1303
BibRef

Chen, B.[Bin], Feng, G.R.[Guo-Rui], Zhang, X.P.[Xin-Peng], Li, F.Y.[Feng-Yong],
Mixing high-dimensional features for JPEG steganalysis with ensemble classifier,
SIViP(8), No. 8, November 2014, pp. 1475-1482.
WWW Link. 1411
BibRef

Cho, S.H.[Seong-Ho], Cha, B.H.[Byung-Ho], Gawecki, M.[Martin], Kuo, C.C.J.[C.C. Jay],
Block-based image steganalysis: Algorithm and performance evaluation,
JVCIR(24), No. 7, 2013, pp. 846-856.
Elsevier DOI 1309
Steganalysis BibRef

Mobasseri, B.G.[Bijan G.], Marcinak, M.P.[Michael P.],
Data hiding in MPEG-2 bitstream by creating exceptions in code space,
SIViP(8), No. 2, February 2014, pp. 307-316.
WWW Link. 1402
BibRef

Qin, C.[Chuan], Chang, C.C.[Chin-Chen], Chiu, Y.P.[Yi-Ping],
A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting,
IP(23), No. 3, March 2014, pp. 969-978.
IEEE DOI 1403
data encapsulation BibRef

Guo, Y.F.[Yuan-Fang], Au, O.C.[Oscar C.], Tang, K.[Ketan], Pang, J.H.[Jia-Hao],
Hiding a Secret Pattern into Color Halftone Images,
IWDW13(465-474).
Springer DOI 1407
BibRef

Karimi, H., Shayesteh, M.G., Akhaee, M.A.,
Steganalysis of JPEG images using enhanced neighbouring joint density features,
IET-IPR(9), No. 7, 2015, pp. 545-552.
DOI Link 1506
discrete cosine transforms BibRef

Nikolaidis, A.,
Reversible data hiding in JPEG images utilising zero quantised coefficients,
IET-IPR(9), No. 7, 2015, pp. 560-568.
DOI Link 1506
data compression BibRef

Hua, G., Xiang, Y., Bi, G.,
When Compressive Sensing Meets Data Hiding,
SPLetters(23), No. 4, April 2016, pp. 473-477.
IEEE DOI 1604
Compressed sensing BibRef

Bouslimi, D.[Dalel], Coatrieux, G.[Gouenou], Cozic, M.[Michel], Roux, C.[Christian],
Data hiding in encrypted images based on predefined watermark embedding before encryption process,
SP:IC(47), No. 1, 2016, pp. 263-270.
Elsevier DOI 1610
Data hiding BibRef

Bouslimi, D.[Dalel], Coatrieux, G.[Gouenou],
A crypto-watermarking system for ensuring reliability control and traceability of medical images,
SP:IC(47), No. 1, 2016, pp. 160-169.
Elsevier DOI 1610
Decryption BibRef

Freitas, P.G.[Pedro Garcia], Farias, M.C.Q.[Mylène C.Q.], Araújo, A.P.F.[Aletéia P.F.],
Hiding color watermarks in halftone images using maximum-similarity binary patterns,
SP:IC(48), No. 1, 2016, pp. 1-11.
Elsevier DOI 1609
Color embedding BibRef

Poljicak, A.[Ante], Botella, G.[Guillermo], Garcia, C.[Carlos], Kedmenec, L.[Luka], Prieto-Matias, M.[Manuel],
Portable real-time DCT-based steganography using OpenCL,
RealTimeIP(14), No. 1, January 2018, pp. 87-99.
Springer DOI 1802
BibRef

Qiu, Y.Q.[Ying-Qiang], He, H.[Han], Qian, Z.X.[Zhen-Xing], Li, S.[Sheng], Zhang, X.P.[Xin-Peng],
Lossless data hiding in JPEG bitstream using alternative embedding,
JVCIR(52), 2018, pp. 86-91.
Elsevier DOI 1804
Information hiding, Lossless data hiding, Reversible data hiding BibRef

Hu, X., Ni, J., Shi, Y.Q.,
Efficient JPEG Steganography Using Domain Transformation of Embedding Entropy,
SPLetters(25), No. 6, June 2018, pp. 773-777.
IEEE DOI 1806
data compression, discrete cosine transforms, entropy, feature extraction, image coding, statistical analysis, domain transformation BibRef

Thai, T.H.[Thanh Hai], Cogranne, R.[Remi], Retraint, F.[Florent],
Statistical Model of Quantized DCT Coefficients: Application in the Steganalysis of Jsteg Algorithm,
IP(23), No. 5, May 2014, pp. 1980-1993.
IEEE DOI 1405
BibRef
Earlier:
Steganalysis of Jsteg algorithm based on a novel statistical model of quantized DCT coefficients,
ICIP13(4427-4431)
IEEE DOI 1402
discrete cosine transforms. Digital Image Model BibRef

Su, W., Ni, J., Li, X., Shi, Y.,
A New Distortion Function Design for JPEG Steganography Using the Generalized Uniform Embedding Strategy,
CirSysVideo(28), No. 12, December 2018, pp. 3545-3549.
IEEE DOI 1812
Distortion, Discrete cosine transforms, Distortion measurement, Transform coding, Complexity theory, Wavelet domain, Security, distortion function BibRef

Zhang, X., Peng, F., Long, M.,
Robust Coverless Image Steganography Based on DCT and LDA Topic Classification,
MultMed(20), No. 12, December 2018, pp. 3223-3238.
IEEE DOI 1812
discrete cosine transforms, feature selection, image classification, image sequences, statistical analysis, discrete cosine transform BibRef

Zhou, W.B.[Wen-Bo], Li, W.X.[Wei-Xiang], Chen, K.J.[Ke-Jiang], Zhou, H.[Hang], Zhang, W.M.[Wei-Ming], Yu, N.H.[Neng-Hai],
Controversial 'pixel' prior rule for JPEG adaptive steganography,
IET-IPR(13), No. 1, January 2019, pp. 24-33.
DOI Link 1812
BibRef

Xue, Y.J.[Ying-Jie], Liu, W.T.[Wan-Teng], Lu, W.[Wei], Yeung, Y.L.[Yui-Leong], Liu, X.J.[Xian-Jin], Liu, H.M.[Hong-Mei],
Efficient halftone image steganography based on dispersion degree optimization,
RealTimeIP(16), No. 3, June 2019, pp. 601-609.
Springer DOI
WWW Link. 1906
BibRef

Feng, G., Zhang, X., Ren, Y., Qian, Z., Li, S.,
Diversity-Based Cascade Filters for JPEG Steganalysis,
CirSysVideo(30), No. 2, February 2020, pp. 376-386.
IEEE DOI 2002
Feature extraction, Transform coding, Discrete cosine transforms, Histograms, Media, Indexes, Integrated circuits, Steganalysis, cascade filter BibRef

Su, A., Ma, S., Zhao, X.,
Fast and Secure Steganography Based on J-UNIWARD,
SPLetters(27), 2020, pp. 221-225.
IEEE DOI 2002
Fast, steganography, steganalysis, JPEG BibRef

Yang, L.[Liran], Zhong, J.[Jing], Zhong, P.[Ping], Xue, Y.M.[Yi-Ming], Wen, J.[Juan],
A Novel Feature Selection Model for JPEG Image Steganalysis,
IWDW19(322-336).
Springer DOI 2003
BibRef

Chanu, O.B.[Oinam Bidyapati], Neelima, A.[Arambam],
A new multi-secret image sharing scheme based on DCT,
VC(36), No. 5, May 2020, pp. 939-950.
WWW Link. 2005
BibRef

Li, Z.Y.[Zhen-Yu], Bors, A.G.[Adrian G.],
Selection of Robust and Relevant Features for 3-D Steganalysis,
Cyber(50), No. 5, May 2020, pp. 1989-2001.
IEEE DOI 2005
BibRef
Earlier:
Selection of robust features for the Cover Source Mismatch problem in 3D steganalysis,
ICPR16(4256-4261)
IEEE DOI 1705
Feature extraction, Training, Shape, Robustness, Machine learning algorithms, Machine learning, Data mining, feature selection. Correlation, Robustness, Testing, Training, 3D Steganalysis, Cover Source Mismatch. BibRef

Li, Z.Y.[Zhen-Yu], Beugnon, S., Puech, W., Bors, A.G.[Adrian G.],
Rethinking the high capacity 3D steganography:\ Increasing its resistance to steganalysis,
ICIP17(510-414)
IEEE DOI 1803
Data mining, Distortion, Face, Image edge detection, Mathematical model, Resistance, steganalysis BibRef

Li, Z.Y.[Zhen-Yu], Gong, D., Liu, F., Bors, A.G.[Adrian G.],
3D Steganalysis Using the Extended Local Feature Set,
ICIP18(1683-1687)
IEEE DOI 1809
Feature extraction, Laplace equations, Watermarking, Testing, Robustness, information hiding BibRef

Jia, J.[Ju], Zhai, L.M.[Li-Ming], Ren, W.X.[Wei-Xiang], Wang, L.[Lina], Ren, Y.Z.[Yan-Zhen], Zhang, L.[Lefei],
Transferable heterogeneous feature subspace learning for JPEG mismatched steganalysis,
PR(100), 2020, pp. 107105.
Elsevier DOI 2005
Mismatched steganalysis, Heterogeneous subspace, Domain-independent features, Domain-related features, Transfer learning BibRef

Li, W., Zhou, W., Zhang, W., Qin, C., Hu, H., Yu, N.,
Shortening the Cover for Fast JPEG Steganography,
CirSysVideo(30), No. 6, June 2020, pp. 1745-1757.
IEEE DOI 2006
Distortion, Transform coding, Security, Encoding, Additives, Time complexity, Real-time systems, Steganography, JPEG images, fast embedding BibRef

Li, W., Chen, K., Zhang, W., Zhou, H., Wang, Y., Yu, N.,
JPEG Steganography With Estimated Side-Information,
CirSysVideo(30), No. 7, July 2020, pp. 2288-2294.
IEEE DOI 2007
Transform coding, Distortion, Security, Noise reduction, Additives, Modulation, Discrete cosine transforms, Steganography, JPEG images, deblocking BibRef

Xia, C.[Chao], Guan, Q.X.[Qing-Xiao], Zhao, X.F.[Xian-Feng], Wu, K.[Keke],
Improved JPEG Phase-Aware Steganalysis Features Using Multiple Filter Sizes and Difference Images,
CirSysVideo(30), No. 11, November 2020, pp. 4100-4113.
IEEE DOI 2011
Transform coding, Feature extraction, Discrete cosine transforms, Convolution, Histograms, Gabor filters, Distortion, Steganalysis, JPEG BibRef

Zhu, J.[Jie], Guan, Q.X.[Qing-Xiao], Zhao, X.F.[Xian-Feng],
Multi-class JPEG Image Steganalysis by Ensemble Linear SVM Classifier,
IWDW14(470-484).
Springer DOI 1602
BibRef

Qiu, Y., Qian, Z., He, H., Tian, H., Zhang, X.,
Optimized Lossless Data Hiding in JPEG Bitstream and Relay Transfer-Based Extension,
CirSysVideo(31), No. 4, April 2021, pp. 1380-1394.
IEEE DOI 2104
Transform coding, Relays, Media, Image coding, Information science, Discrete cosine transforms, Cryptography, embedding capacity BibRef

Wang, Y.F.[Yao-Fei], Li, W.X.[Wei-Xiang], Zhang, W.M.[Wei-Ming], Yu, X.Z.[Xin-Zhi], Liu, K.L.[Kun-Lin], Yu, N.H.[Neng-Hai],
BBC++: Enhanced Block Boundary Continuity on Defining Non-Additive Distortion for JPEG Steganography,
CirSysVideo(31), No. 5, 2021, pp. 2082-2088.
IEEE DOI 2105
BibRef

Agrawal, R.[Rohit], Ahuja, K.[Kapil],
CSIS: Compressed sensing-based enhanced-embedding capacity image steganography scheme,
IET-IPR(15), No. 9, 2021, pp. 1909-1925.
DOI Link 2106
BibRef

Damghani, H.[Hamidreza], Mofrad, F.B.[Farshid Babapour], Damghani, L.[Leila],
Medical JPEG image steganography method according to the distortion reduction criterion based on an imperialist competitive algorithm,
IET-IPR(15), No. 3, 2021, pp. 705-714.
DOI Link 2106
BibRef

Lu, W.[Wei], Zhang, J.H.[Jun-Hong], Zhao, X.F.[Xian-Feng], Zhang, W.M.[Wei-Ming], Huang, J.W.[Ji-Wu],
Secure Robust JPEG Steganography Based on AutoEncoder With Adaptive BCH Encoding,
CirSysVideo(31), No. 7, July 2021, pp. 2909-2922.
IEEE DOI 2107
Image coding, Transform coding, Robustness, Discrete cosine transforms, Security, Receivers, Error analysis, BCH encoding BibRef

Yin, X.L.[Xiao-Lin], Lu, W.[Wei], Liu, W.[Wanteng], Guo, J.M.[Jing-Ming], Huang, J.W.[Ji-Wu], Shi, Y.Q.[Yun-Qing],
Reversible Data Hiding in Halftone Images Based on Dynamic Embedding States Group,
CirSysVideo(31), No. 7, July 2021, pp. 2631-2645.
IEEE DOI 2107
Visualization, Distortion, Image coding, Table lookup, Payloads, Markov processes, Histograms, Halftone images, Markov transition BibRef

Luo, W.W.[Wei-Wei], Zhou, W.P.[Wen-Peng], Fang, J.L.[Jing-Long], Fan, L.Y.[Ling-Yan],
JPEG Image Steganalysis Using Weight Allocation from Block Evaluation,
IEICE(E105-D), No. 1, January 2022, pp. 180-183.
WWW Link. 2201
BibRef

Zhang, J.[Jimin], Zhao, X.F.[Xian-Feng], He, X.L.[Xiao-Lei], Zhang, H.[Hong],
Improving the Robustness of JPEG Steganography With Robustness Cost,
SPLetters(29), 2022, pp. 164-168.
IEEE DOI 2202
Robustness, Discrete cosine transforms, Transform coding, Steganography, Costs, Distortion, Social networking (online), JPEG recompression BibRef

Tang, W.X.[Wei-Xuan], Li, B.[Bin], Barni, M.[Mauro], Li, J.[Jin], Huang, J.W.[Ji-Wu],
Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge,
CirSysVideo(32), No. 6, June 2022, pp. 4081-4095.
IEEE DOI 2206
Costs, Discrete cosine transforms, Transform coding, Steganography, Correlation, Complexity theory, Additives, JPEG steganography, automatic cost learning BibRef

Lu, W.[Wei], Chen, J.J.[Jun-Jia], Zhang, J.H.[Jun-Hong], Huang, J.W.[Ji-Wu], Weng, J.[Jian], Zhou, Y.C.[Yi-Cong],
Secure Halftone Image Steganography Based on Feature Space and Layer Embedding,
Cyber(52), No. 6, June 2022, pp. 5001-5014.
IEEE DOI 2207
Distortion, Security, Media, Gray-scale, Frequency division multiplexing, Cybernetics, syndrome-trellis codes (STCs) BibRef

Liu, Z.Y.[Zi-Yu], Yi, X.W.[Xiao-Wei], Zhao, X.F.[Xian-Feng], Yang, Y.Z.[Yun-Zhao],
Content-Aware Robust JPEG Steganography for Lossy Channels Using LPCNet,
SPLetters(29), 2022, pp. 2253-2257.
IEEE DOI 2212
Feature extraction, Speech coding, Social networking (online), Robustness, Cepstrum, Transform coding, Speech synthesis, social networks BibRef

Zhang, J.S.[Jian-Song], Chen, K.J.[Ke-Jiang], Qin, C.[Chuan], Zhang, W.M.[Wei-Ming], Yu, N.H.[Neng-Hai],
Distribution-Preserving-Based Automatic Data Augmentation for Deep Image Steganalysis,
MultMed(24), 2022, pp. 4538-4550.
IEEE DOI 2212
Task analysis, Feature extraction, Training, Convolution, Payloads, Steganography, Databases, Image, steganography, steganalysis, data augmentation BibRef

Puteaux, P.[Pauline], Yriarte, F.[Félix], Puech, W.[William],
A Secret JPEG Image Sharing Method Over GF(2M) Galois Fields,
CirSysVideo(33), No. 6, June 2023, pp. 3030-3042.
IEEE DOI 2306
Transform coding, Image coding, Visualization, Galois fields, Encryption, Image reconstruction, Multimedia security, JPEG compression BibRef

Wang, Z.C.[Zi-Chi], Feng, G.R.[Guo-Rui], Qian, Z.X.[Zhen-Xing], Zhang, X.P.[Xin-Peng],
JPEG Steganography With Content Similarity Evaluation,
Cyber(53), No. 8, August 2023, pp. 5082-5093.
IEEE DOI 2307
Transform coding, Distortion, Steganography, Discrete cosine transforms, Costs, Feature extraction, Steganography BibRef

Chen, B.[Beijing], Nie, Y.X.[Yu-Xin], Yang, J.H.[Jian-Hua],
Toward high imperceptibility deep JPEG steganography based on sparse adversarial attack,
JVCIR(97), 2023, pp. 103977.
Elsevier DOI Code:
WWW Link. 2312
JPEG, Steganography, Adversarial attack, Deep neural network, Steganalysis BibRef


Yriarte, F.[Felix], Puteaux, P.[Pauline], Puech, W.[William],
A Joint Secret Image Sharing and Jpeg Compression Scheme,
ICIP22(581-585)
IEEE DOI 2211
Q-factor, Visualization, Cloud computing, Image coding, Transform coding, Cryptography, Galois fields, Multimedia security, JPEG compression BibRef

Wu, Y.[Yue], Meng, G.[Guotao], Chen, Q.F.[Qi-Feng],
Embedding Novel Views in a Single JPEG Image,
ICCV21(14499-14507)
IEEE DOI 2203
Image coding, Codes, Image color analysis, Convolution, Transform coding, Prediction methods, Image and video synthesis, BibRef

Quan, X.M.[Xiao-Mei],
JPEG Steganalysis Based on Local Dimension Estimation,
ICIVC21(306-311)
IEEE DOI 2112
Manifolds, Art, Digital forensics, Transform coding, Estimation, Manifold learning, steganalysis, manifold learning, local dimension estimation BibRef

Ma, S.[Sai], Zhao, X.F.[Xian-Feng],
Generating JPEG Steganographic Adversarial Example via Segmented Adversarial Embedding,
IWDW20(68-79).
Springer DOI 2103
BibRef

Ruiz, H.[Hugo], Yedroudj, M.[Mehdi], Chaumont, M.[Marc], Comby, F.[Frédéric], Subsol, G.[Gérard],
LSSD: A Controlled Large JPEG Image Database for Deep-learning-based Steganalysis 'into the Wild',
MMForWild20(470-483).
Springer DOI 2103
BibRef

Lu, Y.[Yubo], Zhai, L.M.[Li-Ming], Wang, L.[Lina],
Designing Non-additive Distortions for JPEG Steganography Based on Blocking Artifacts Reduction,
IWDW19(268-280).
Springer DOI 2003
BibRef

Malik, A.[Asad], Wang, H.X.[Hong-Xia], Khan, A.N.[Ahmad Neyaz], Chen, Y.L.[Yan-Li], Chen, Y.[Yi],
A Novel Lossless Data Hiding Scheme in Homomorphically Encrypted Images,
IWDW19(213-220).
Springer DOI 2003
BibRef

Zheng, H.L.[Hui-Lin], Li, X.[Xuan], Ruan, D.Y.[Dan-Yang], Kang, X.G.[Xian-Gui], Shi, Y.Q.[Yun-Qing],
Comparison of DCT and Gabor Filters in Residual Extraction of CNN Based JPEG Steganalysis,
IWDW18(29-39).
Springer DOI 1905
BibRef

Bonnet, B.[Benoît], Furon, T.[Teddy], Bas, P.[Patrick],
Forensics Through Stega Glasses: The Case of Adversarial Images,
MMForWild20(453-469).
Springer DOI 2103
BibRef

Taburet, T.[Théo], Filstroff, L.[Louis], Bas, P.[Patrick], Sawaya, W.[Wadih],
An Empirical Study of Steganography and Steganalysis of Color Images in the JPEG Domain,
IWDW18(290-303).
Springer DOI 1905
BibRef

Feng, C., Kong, X., Li, M., Yang, Y., Guo, Y.,
Contribution-based feature transfer for JPEG mismatched steganalysis,
ICIP17(500-504)
IEEE DOI 1803
Correlation, Kernel, Media, Q-factor, Testing, Training, Transform coding, JPEG image, Mismatched steganalysis, feature transfer BibRef

Wazirali, R., Chaczko, Z.,
Perceptual threshold in DWT for optimum embedding rate in data hiding using HVS and GA,
ICVNZ15(1-8)
IEEE DOI 1701
data protection BibRef

Ait Saadi, K., Zebbiche, K., Laadjel, M., Morsli, M.A.,
Real time watermarking to authenticate the WSQ bitstream,
IPTA12(239-243)
IEEE DOI 1503
image coding Wavelet-packet Scalar Quantization. BibRef

Imaizumi, S.[Shoko], Ozawa, K.[Kei],
Multibit Embedding Algorithm for Steganography of Palette-Based Images,
PSIVT13(99-110).
Springer DOI 1402
BibRef

Li, X.F.[Xiao-Feng], Kong, X.W.[Xiang-Wei], Wang, B.[Bo], Guo, Y.Q.[Yan-Qing], You, X.G.[Xin-Gang],
Generalized transfer component analysis for mismatched JPEG steganalysis,
ICIP13(4432-4436)
IEEE DOI 1402
domain alignment; mismatch; steganalysis; transfer component analysis BibRef

Sachnev, V.[Vasily], Kim, H.J.[Hyoung Joong],
An Improved Matrix Encoding Scheme for JPEG Steganography,
IWDW11(3-15).
Springer DOI 1208
BibRef
Earlier:
Ternary Data Hiding Technique for JPEG Steganography,
DW10(202-210).
Springer DOI 1010
BibRef

Sachnev, V.[Vasiliy], Kim, H.J.[Hyoung Joong], Zhang, R.Y.[Rong-Yue], Choi, Y.S.[Yong Soo],
A Novel Approach for JPEG Steganography,
DW08(209-217).
Springer DOI 0811
BibRef

Huang, F.J.[Fang-Jun], Shi, Y.Q.[Yun Qing], Huang, J.W.[Ji-Wu],
New JPEG Steganographic Scheme with High Security Performance,
DW10(189-201).
Springer DOI 1010
BibRef

Nataraj, L., Sarkar, A., Manjunath, B.S.,
Precise localization of key-points to identify local regions for robust data hiding,
ICIP10(3681-3684).
IEEE DOI 1009
BibRef

Leng, C.K.[Chiew Kang], Pieprzyk, J.,
Features-Pooling Blind JPEG Image Steganalysis,
DICTA08(96-103).
IEEE DOI 0812
BibRef

Lin, J.Q.[Jing-Qu], Wang, X.D.[Xiao-Dong], Zhong, S.P.[Shang-Ping],
Reduction of Markov Extended Features in JPEG Image Steganalysis,
CISP09(1-5).
IEEE DOI 0910
BibRef

Li, L.[Leida], Guo, B.L.[Bao-Long], Pan, J.S.[Jeng-Shyang], Yang, L.[Liu],
Scale-Space Feature Based Image Watermarking in Contourlet Domain,
DW08(88-102).
Springer DOI 0811
BibRef

Khan, Z.[Zohaib], Mansoor, A.B.[Atif Bin],
A New Hybrid DCT and Contourlet Transform Based JPEG Image Steganalysis Technique,
SCIA09(321-330).
Springer DOI 0906
BibRef
And:
Steganalysis of JPEG Images with Joint Transform Features,
PSIVT09(965-975).
Springer DOI 0901
BibRef

Barbier, J.[Johann], Mayoura, K.[Kichenakoumar],
Steganalysis of Multi Bit Plane Image Steganography,
DW07(99-111).
Springer DOI 0712
BibRef

Barbier, J.[Johann], Filiol, É.[Éric], Mayoura, K.[Kichenakoumar],
Universal JPEG Steganalysis in the Compressed Frequency Domain,
DW06(253-267).
Springer DOI 0611
BibRef

Dong, J.[Jing], Wang, W.[Wei], Tan, T.N.[Tie-Niu],
Multi-class Blind Steganalysis Based on Image Run-Length Analysis,
DW09(199-210).
Springer DOI 0908
BibRef

Dong, J.[Jing], Tan, T.N.[Tie-Niu],
Blind Image Steganalysis Based on Run-Length Histogram Analysis,
ICIP08(2064-2067).
IEEE DOI 0810
BibRef

Jiang, W.[Weina], Ho, A.T.S., Treharne, H.,
Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model,
DW07(423-439).
Springer DOI 0712
BibRef

Wang, P.[Ping], Liu, F.L.[Fen-Lin], Wang, G.D.[Guo-Dong], Sun, Y.F.[Yi-Feng], Gong, D.F.[Dao-Fu],
Multi-class steganalysis for Jpeg stego algorithms,
ICIP08(2076-2079).
IEEE DOI 0810
BibRef

Huang, F.J.[Fang-Jun], Li, B.[Bin], Huang, J.W.[Ji-Wu],
Universal JPEG steganalysis based on microscopic and macroscopic calibration,
ICIP08(2068-2071).
IEEE DOI 0810
BibRef

Huang, F.J.[Fang-Jun], Zhong, Y.[Yane], Huang, J.W.[Ji-Wu],
Improved Algorithm of Edge Adaptive Image Steganography Based on LSB Matching Revisited Algorithm,
IWDW13(19-31).
Springer DOI 1407
BibRef

Huang, F.J.[Fang-Jun], Li, B.[Bin], Huang, J.W.[Ji-Wu],
Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels,
ICIP07(I: 401-404).
IEEE DOI 0709
BibRef

Li, B.[Bin], Huang, F.J.[Fang-Jun], Huang, J.W.[Ji-Wu],
Steganalysis of LSB Greedy Embedding Algorithm for JPEG Images using Coefficient Symmetry,
ICIP07(I: 413-416).
IEEE DOI 0709
BibRef

Choi, H.J.[Hyun-Jun], Seo, Y.H.[Young-Ho], Yoo, J.S.[Ji-Sang], Kim, D.W.[Dong-Wook],
An Electronic Watermarking Technique for Digital Holograms in a DWT Domain,
PSIVT06(1007-1017).
Springer DOI 0612
BibRef

Damnjanovic, I.[Ivan], Izquierdo, E.[Ebroul],
Capacity Enhancement of Compressed Domain Watermarking Channel Using Duo-binary Coding,
DW06(162-176).
Springer DOI 0611
BibRef

Dong, J.[Jing], Wang, W.[Wei], Tan, T.N.[Tie-Niu], Shi, Y.Q.[Yun Q.],
Run-Length and Edge Statistics Based Approach for Image Splicing Detection,
DW08(76-87).
Springer DOI 0811
BibRef

Shi, Y.Q.[Yun Q.], Chen, C.H.[Chun-Hua], Xuan, G.R.[Guo-Rong], Su, W.[Wei],
Steganalysis Versus Splicing Detection,
DW07(158-172).
Springer DOI 0712
BibRef

Chen, C.H.[Chun-Hua], Shi, Y.Q.[Yun Q.], Chen, W.[Wen], Xuan, G.R.[Guo-Rong],
Statistical Moments Based Universal Steganalysis using JPEG 2-D Array and 2-D Characteristic Function,
ICIP06(105-108).
IEEE DOI 0610
BibRef

Tan, S.Q.[Shun-Quan], Huang, J.W.[Ji-Wu], Shi, Y.Q.[Yun Q.],
Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis,
DW07(112-126).
Springer DOI 0712
BibRef

Li, B.[Bin], Huang, F.J.[Fang-Jun], Tan, S.Q.[Shun-Quan], Huang, J.W.[Ji-Wu], Shi, Y.Q.[Yun Q.],
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis,
DW07(143-157).
Springer DOI 0712
BibRef

Tan, S.Q.[Shun-Quan], Huang, J.W.[Ji-Wu], Yang, Z.H.[Zhi-Hua], Shi, Y.Q.,
Steganalysis of JPEG2000 Lazy-Mode Steganography using the Hilbert-Huang Transform Based Sequential Analysis,
ICIP06(101-104).
IEEE DOI 0610
BibRef

Quan, X.M.[Xiao-Mei], Zhang, H.B.[Hong-Bin],
Data Hiding in MPEG Compressed Audio Using Wet Paper Codes,
ICPR06(IV: 727-730).
IEEE DOI 0609
BibRef

Kimoto, T.,
Designing Template Cells Suitable for Secret-Sharing Halftone Images by Quantitative Analysis,
ICIP06(2593-2596).
IEEE DOI 0610
BibRef
Earlier:
Implementation of Level Transformations for Hiding Watermarks in Image Bit-Planes under Limited Level Changes,
ICIP05(I: 253-256).
IEEE DOI 0512
BibRef

Ratha, N.K.[Nalini K.], Figueroa-Villanueva, M.A.[Miguel A.], Connell, J.H.[Jonathan H.], Bolle, R.M.[Ruud M.],
A Secure Protocol for Data Hiding in Compressed Fingerprint Images,
BioAW04(205-216).
Springer DOI 0505
BibRef

Lin, S.D.[Shinfeng D.], Shie, S.C.[Shih-Chieh], Chou, C.C.[Chung-Chien],
A suitable image hiding scheme for jpeg images,
ICIP04(III: 1565-1568).
IEEE DOI 0505
BibRef

Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Surveys, Image Hiding, Data Hiding, Steganography .


Last update:Sep 28, 2024 at 17:47:54