Chung, K.L.[Kuo-Liang],
Shen, C.H.[Chao-Hui],
Chang, L.C.[Lung-Chun],
A novel SVD- and VQ-based image hiding scheme,
PRL(22), No. 9, July 2001, pp. 1051-1058.
Elsevier DOI
0106
BibRef
Fu, M.S.[Ming Sun],
Au, O.C.[Oscar C.],
Halftone image data hiding with intensity selection and connection
selection,
SP:IC(16), No. 10, August 2001, pp. 909-930.
Elsevier DOI
0001
Data hiding; Watermark; Halftone image; Intensity; Connection; Selection;
Toggling; Eccentricity; Inverse halftoning; Error diffusion; Dithering
BibRef
Ramkumar, M.,
Akansu, A.N.,
Capacity estimates for data hiding in compressed images,
IP(10), No. 8, August 2001, pp. 1252-1263.
IEEE DOI
0108
BibRef
Spaulding, J.[Jeremiah],
Noda, H.[Hideki],
Shirazi, M.N.[Mahdad N.],
Kawaguchi, E.[Eiji],
BPCS steganography using EZW lossy compressed images,
PRL(23), No. 13, November 2002, pp. 1579-1587.
Elsevier DOI
0206
BibRef
Noda, H.,
Spaulding, J.,
Shirazi, M.N.,
Kawaguchi, E.,
Application of bit-plane decomposition steganography to JPEG2000
encoded images,
SPLetters(9), No. 12, December 2002, pp. 410-413.
IEEE Top Reference.
0301
BibRef
Niimi, M.,
Nakamura, T.,
Noda, H.,
Application of Complexity Measure to Reversible Information Hiding,
ICIP06(113-116).
IEEE DOI
0610
BibRef
Noda, H.,
Spaulding, J.,
Shirazi, M.N.,
Niimi, M.,
Kawaguchi, E.,
Application of bit-plane decomposition steganography to wavelet
encoded images,
ICIP02(II: 909-912).
IEEE DOI
0210
BibRef
Chang, C.C.,
Chuang, J.C.,
Lai, Y.P.,
Hiding data in multitone images for data communications,
VISP(151), No. 2, April 2004, pp. 137-145.
IEEE Abstract.
0406
BibRef
Chang, C.C.[Chin-Chen],
Chen, G.M.[Guei-Mei],
Lin, M.H.[Min-Hui],
Information hiding based on search-order coding for VQ indices,
PRL(25), No. 11, August 2004, pp. 1253-1261.
Elsevier DOI
0409
BibRef
Chang, C.C.[Chin-Chen],
Tseng, H.W.[Hsien-Wen],
A steganographic method for digital images using side match,
PRL(25), No. 12, September 2004, pp. 1431-1437.
Elsevier DOI
0409
BibRef
Lu, T.C.[Tzu-Chuen],
Chang, C.C.[Chin-Chen],
Lossless nibbled data embedding scheme based on difference expansion,
IVC(26), No. 5, May 2008, pp. 632-638.
Elsevier DOI
0803
Lossless data embedding; Difference expansion; Nibble; Arithmetic coding;
Prediction by partial matching
BibRef
Chang, C.C.[Chin-Chen],
Lin, C.Y.[Chih-Yang],
Fan, Y.H.[Yi-Hsuan],
Lossless data hiding for color images based on block truncation coding,
PR(41), No. 7, July 2008, pp. 2347-2357.
Elsevier DOI
0804
See also extended difference expansion algorithm for reversible watermarking, An. Reversible data hiding; Steganography; Block truncation coding (BTC);
Genetic algorithm (GA)
BibRef
Chen, K.M.[Kai-Meng],
Chang, C.C.[Chin-Chen],
High-capacity reversible data hiding in encrypted images based on
extended run-length coding and block-based MSB plane rearrangement,
JVCIR(58), 2019, pp. 334-344.
Elsevier DOI
1901
Reversible data hiding, Run-length coding, Image encryption
BibRef
Gao, K.[Kai],
Horng, J.H.[Ji-Hwei],
Chang, C.C.[Chin-Chen],
High-capacity reversible data hiding in encrypted images based on
adaptive block encoding,
JVCIR(84), 2022, pp. 103481.
Elsevier DOI
2204
Encrypted image, Data hiding, Adaptive block encoding, Embedding capacity
BibRef
Lin, C.C.[Chia-Chen],
Tai, W.L.[Wei-Liang],
Chang, C.C.[Chin-Chen],
Multilevel Reversible Data Hiding Based on Histogram Modification of
Difference Images,
PR(41), No. 12, December 2008, pp. 3582-3591.
Elsevier DOI
0810
Data hiding; Multilevel hiding strategy; Reversibility; Histogram
BibRef
Wang, X.[Xu],
Chang, C.C.[Ching-Chun],
Lin, C.C.[Chia-Chen],
Chang, C.C.[Chin-Chen],
On the multi-level embedding of crypto-image reversible data hiding,
JVCIR(87), 2022, pp. 103556.
Elsevier DOI
2208
Reversible data hiding, Encrypted images, Multi-Level,
Block mapping, Very high embedding capacity
BibRef
Tai, W.L.[Wei-Liang],
Yeh, C.M.,
Chang, C.C.[Chin-Chen],
Reversible Data Hiding Based on Histogram Modification of Pixel
Differences,
CirSysVideo(19), No. 6, June 2009, pp. 906-910.
IEEE DOI
0906
BibRef
Su, G.D.[Guo-Dong],
Chang, C.C.[Chin-Chen],
Lin, C.C.[Chia-Chen],
Yao, Z.Q.[Zhi-Qiang],
Secure high capacity tetris-based scheme for data hiding,
IET-IPR(14), No. 17, 24 December 2020, pp. 4633-4645.
DOI Link
2104
BibRef
And:
Erratum:
IET-IPR(15), No. 12, 2021, pp. 3020-3020.
DOI Link
2109
BibRef
Nguyen, T.S.[Thai-Son],
Chang, C.C.[Chin-Chen],
Chang, W.C.[Wen-Chi],
High capacity reversible data hiding scheme for encrypted images,
SP:IC(44), No. 1, 2016, pp. 84-91.
Elsevier DOI
1605
Data hiding
BibRef
Chen, C.C.[Chih-Cheng],
Chang, C.C.[Chin-Chen],
Chen, K.M.[Kai-Meng],
High-capacity reversible data hiding in encrypted image based on
Huffman coding and differences of high nibbles of pixels,
JVCIR(76), 2021, pp. 103060.
Elsevier DOI
2104
Reversible data hiding, Image encryption, Huffman coding, High nibble
BibRef
Lin, P.Y.[Pei-Yu],
Lee, J.S.[Jung-San],
Chang, C.C.[Chin-Chen],
Distortion-free secret image sharing mechanism using modulus operator,
PR(42), No. 5, May 2009, pp. 886-895.
Elsevier DOI
0902
Secret sharing; Distortion-free; Rabin's signature; Modulus operator;
Cheater detection
BibRef
Chang, C.C.[Chin-Chen],
Lin, C.C.[Chia-Chen],
Le, T.H.N.[T. Hoang Ngan],
Le, H.B.[Hoai Bac],
Sharing a verifiable secret image using two shadows,
PR(42), No. 11, November 2009, pp. 3097-3114.
Elsevier DOI
0907
Visual secret sharing; Error diffusion; Inverse halftoning; (7, 4)
Hamming code; Verifiable secret image; Clustering
BibRef
Huynh, N.T.[Ngoc-Tu],
Bharanitharan, K.,
Chang, C.C.[Chin-Chen],
Quadri-directional searching algorithm for secret image sharing using
meaningful shadows,
JVCIR(28), No. 1, 2015, pp. 105-112.
Elsevier DOI
1503
Secret image sharing
BibRef
Chang, C.C.[Chin-Chen],
Liu, Y.,
Wu, H.L.,
Distortion-free secret image sharing method with two meaningful
shadows,
IET-IPR(10), No. 8, 2016, pp. 590-597.
DOI Link
1608
image reconstruction
BibRef
Qin, C.[Chuan],
Chang, C.C.[Chin-Chen],
Liao, L.T.[Li-Ting],
An adaptive prediction-error expansion oriented reversible information
hiding scheme,
PRL(33), No. 16, 1 December 2012, pp. 2166-2172.
Elsevier DOI
1210
Reversible data hiding; Prediction-error expansion; Embedding rate;
Visual quality
BibRef
Noda, H.[Hideki],
Niimi, M.[Michiharu],
Kawaguchi, E.[Eiji],
High-performance JPEG steganography using quantization index modulation
in DCT domain,
PRL(27), No. 5, 1 April 2006, pp. 455-461.
Elsevier DOI
0604
BibRef
Earlier:
Application of QIM with Dead Zone for Histogram Preserving JPEG
Steganography,
ICIP05(II: 1082-1085).
IEEE DOI
0512
Information security; Quantization index modulation;
Histogram matching
BibRef
Niimi, M.,
Ei, T.,
Noda, H.,
Kawaguchi, E.,
Segee, B.,
An attack to BPCS-steganography using complexity histogram and
countermeasure,
ICIP04(II: 733-736).
IEEE DOI
0505
BibRef
Niimi, M.,
Noda, H.,
Kawaguchi, E.,
Eason, R.O.,
Luminance quasi-preserving color quantization for digital steganography
to palette-based images,
ICPR02(I: 251-254).
IEEE DOI
0211
BibRef
And:
High capacity and secure digital steganography to palette-based images,
ICIP02(II: 917-920).
IEEE DOI
0210
BibRef
Noda, H.,
Furuta, T.,
Niimi, M.,
Kawaguchi, E.,
Application of BPCS steganography to wavelet compressed video,
ICIP04(IV: 2147-2150).
IEEE DOI
0505
BibRef
Niimi, M.[Michiharu],
Noda, H.[Hideki],
Segee, B.[Bruce],
A Study on Visual Attack to BPCS-Steganography and Countermeasure,
VLBV05(29-36).
Springer DOI
0509
BibRef
Campisi, P.[Patrizio],
Kundur, D.[Deepa],
Hatzinakos, D.[Dimitrios],
Neri, A.[Alessandro],
Compressive Data Hiding:
An Unconventional Approach for Improved Color Image Coding,
JASP(2002), No. 2, 2002, pp. 152-163.
0202
BibRef
Wu, C.W.[Chai Wah],
Multimedia Data Hiding and Authentication via Halftoning and Coordinate
Projection,
JASP(2002), No. 2, 2002, pp. 143-151.
0202
BibRef
Maniccam, S.S.,
Bourbakis, N.,
Lossless compression and information hiding in images,
PR(37), No. 3, March 2004, pp. 475-486.
Elsevier DOI
0401
BibRef
Chrysos, G.[Grigorios],
Dollas, A.[Apostolos],
Bourbakis, N.[Nikolaos],
Architecture and design of an embeddable system for SCAN-based
compression, encryption and information hiding,
RealTimeIP(2), No. 4, December 2007, pp. 207-222.
Springer DOI
0712
BibRef
Fung, Y.H.[Yik-Hing],
Chan, Y.H.[Yuk-Hee],
Embedding halftones of different resolutions in a full-scale halftone,
SPLetters(13), No. 3, March 2006, pp. 153-156.
IEEE DOI
0604
BibRef
Chang, C.C.,
Wu, W.C.,
Hiding secret data adaptively in vector quantisation index tables,
VISP(153), No. 5, October 2006, pp. 589-597.
DOI Link
0702
BibRef
Liu, C.L.[Chiang-Lung],
Liao, S.R.[Shiang-Rong],
High-performance JPEG steganography using complementary embedding
strategy,
PR(41), No. 9, September 2008, pp. 2945-2955.
Elsevier DOI
0806
Image hiding; JPEG steganography; Chi-square family attack;
S family attack; Statistical steganalysis; Complementary embedding
BibRef
Gul, G.,
Dirik, A.E.,
Avcibas, I.[Ismail],
Steganalytic Features for JPEG Compression-Based Perturbed Quantization,
SPLetters(14), No. 3, March 2007, pp. 205-208.
IEEE DOI
0703
See also Image Steganalysis with Binary Similarity Measures.
BibRef
Shie, S.C.[Shih-Chieh],
Lin, S.D.[Shinfeng D.],
Secret image transmission based on VQ and data embedding,
IJIST(17), No. 1, 2007, pp. 1-9.
DOI Link
0707
BibRef
Kapotas, S.K.[Spyridon K.],
Skodras, A.N.[Athanassios N.],
Real time data hiding by exploiting the IPCM macroblocks in H.264/AVC
streams,
RealTimeIP(4), No. 1, March 2009, pp. xx-yy.
Springer DOI
0903
BibRef
Zhang, L.,
Wang, H.,
Wu, R.,
A High-Capacity Steganography Scheme for JPEG2000 Baseline System,
IP(18), No. 8, August 2009, pp. 1797-1803.
IEEE DOI
0907
BibRef
Yang, C.H.[Cheng-Hsing],
Weng, C.Y.[Chi-Yao],
Wang, S.J.[Shiuh-Jeng],
Sun, H.M.[Hung-Min],
Grouping strategies for promoting image quality of watermarking on the
basis of vector quantization,
JVCIR(21), No. 1, January 2010, pp. 49-55.
Elsevier DOI
1002
Vector quantization; Watermarking; Image quality; Copyright
protection; Robustness; Stego-image; Bipartite-matching;
Peak-signal-noise-ratio
BibRef
Phadikar, A.[Amit],
Maity, S.P.[Santi P.],
ROI Based Quality Access Control of Compressed Color Image using DWT
via Lifting,
ELCVIA(8), No. 2, July 2009, pp. xx-yy.
DOI Link
1002
BibRef
Phadikar, A.[Amit],
Maity, S.P.[Santi P.],
Data hiding based quality access control of digital images using
adaptive QIM and lifting,
SP:IC(26), No. 10, November 2011, pp. 646-661.
Elsevier DOI
1111
Data hiding; Data modulation; Access control; Security; Lifting; QIM
BibRef
Phadikar, A.[Amit],
Maity, S.P.[Santi P.],
Mandal, M.[Mrinal],
Novel wavelet-based QIM data hiding technique for tamper detection and
correction of digital images,
JVCIR(23), No. 3, April 2012, pp. 454-466.
Elsevier DOI
1203
Semi-fragile watermarking; Data hiding; Tamper detection; Tamper
correction; Quantization index modulation; Wavelets; Integer wavelets;
Image half-toning
BibRef
Phadikar, A.[Amit],
Maity, S.P.[Santi P.],
Kundu, M.K.[Malay K.],
Quantization Based Data Hiding Scheme for Efficient Quality Access
Control of Images Using DWT via Lifting,
ICCVGIP08(265-272).
IEEE DOI
0812
BibRef
Zhang, J.,
Zhang, D.,
Detection of LSB Matching Steganography in Decompressed Images,
SPLetters(17), No. 2, February 2010, pp. 141-144.
IEEE DOI
0912
BibRef
Amat, P.,
Puech, W.,
Druon, S.,
Pedeboy, J.P.,
Lossless 3D steganography based on MST and connectivity modification,
SP:IC(25), No. 6, July 2010, pp. 400-412.
Elsevier DOI
1007
Data hiding; Steganography; Watermarking; 3D triangular mesh;
Quadruple; Graph scanning
BibRef
Beugnon, S.,
Puech, W.,
Pedeboy, J.P.,
Format-Compliant Selective Secret 3-D Object Sharing Scheme,
MultMed(21), No. 9, September 2019, pp. 2171-2183.
IEEE DOI
1909
Image reconstruction, Distortion,
Encryption, Geometry, Interpolation, 3D selective encryption,
content protection
BibRef
Bulan, O.[Orhan],
Sharma, G.[Gaurav],
Monga, V.[Vishal],
Orientation Modulation for Data Hiding in Clustered-Dot Halftone Prints,
IP(19), No. 8, August 2010, pp. 2070-2084.
IEEE DOI
1008
BibRef
Earlier:
Adaptive decoding for halftone orientation-based data hiding,
ICIP08(1280-1283).
IEEE DOI
0810
See also High Capacity Color Barcodes: Per Channel Data Encoding via Orientation Modulation in Elliptical Dot Arrays.
BibRef
Bulan, O.[Orhan],
Monga, V.[Vishal],
Sharma, G.[Gaurav],
Capacity Analysis For Orthogonal Halftone Orientation Modulation
Channels,
IP(21), No. 1, January 2012, pp. 405-411.
IEEE DOI
1112
BibRef
Seo, Y.H.[Young-Ho],
Choi, H.J.[Hyun-Jun],
Yoo, J.S.[Ji-Sang],
Kim, D.W.[Dong-Wook],
Selective and adaptive signal hiding technique for security of JPEG2000,
IJIST(20), No. 3, September 2010, pp. 277-284.
DOI Link
1008
BibRef
Wang, Y.[Yong],
Liu, J.[Jiufen],
Zhang, W.M.[Wei-Ming],
Lian, S.[Shiguo],
Reliable JPEG steganalysis based on multi-directional correlations,
SP:IC(25), No. 8, September 2010, pp. 577-587.
Elsevier DOI
1003
Steganography; Steganalysis; Calibration; Multi-directions; Analysis
of variance; Support vector machine
BibRef
Luo, W.Q.[Wei-Qi],
Wang, Y.G.[Yuan-Gen],
Huang, J.W.[Ji-Wu],
Security Analysis on Spatial +/- 1 Steganography for JPEG Decompressed
Images,
SPLetters(18), No. 1, January 2011, pp. 39-42.
IEEE DOI
1101
BibRef
Keskinarkaus, A.[Anja],
Pramila, A.[Anu],
Seppänen, T.[Tapio],
Image watermarking with feature point based synchronization robust to
print-scan attack,
JVCIR(23), No. 3, April 2012, pp. 507-515.
Elsevier DOI
1203
BibRef
Earlier: A2, A1, A3:
Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data
Hiding,
DW07(279-293).
Springer DOI
0712
Feature points; Second generation watermarking; Multibit watermarking;
Periodic patterns; Geometrical attacks; Print-scan attack; Compound
attacks; Synchronization
BibRef
Pramila, A.[Anu],
Keskinarkaus, A.[Anja],
Seppänen, T.[Tapio],
Toward an interactive poster using digital watermarking and a mobile
phone camera,
SIViP(6), No. 2, June 2012, pp. 211-222.
WWW Link.
1205
BibRef
Keskinarkaus, A.[Anja],
Pramila, A.[Anu],
Seppänen, T.[Tapio],
Sauvola, J.[Jaakko],
Wavelet Domain Print-Scan and JPEG Resilient Data Hiding Method,
DW06(82-95).
Springer DOI
0611
BibRef
Li, F.Y.[Feng-Yong],
Zhang, X.P.[Xin-Peng],
Chen, B.[Bin],
Feng, G.R.[Guo-Rui],
JPEG Steganalysis With High-Dimensional Features and Bayesian Ensemble
Classifier,
SPLetters(20), No. 3, March 2013, pp. 233-236.
IEEE DOI
1303
BibRef
Chen, B.[Bin],
Feng, G.R.[Guo-Rui],
Zhang, X.P.[Xin-Peng],
Li, F.Y.[Feng-Yong],
Mixing high-dimensional features for JPEG steganalysis with ensemble
classifier,
SIViP(8), No. 8, November 2014, pp. 1475-1482.
WWW Link.
1411
BibRef
Cho, S.H.[Seong-Ho],
Cha, B.H.[Byung-Ho],
Gawecki, M.[Martin],
Kuo, C.C.J.[C.C. Jay],
Block-based image steganalysis: Algorithm and performance evaluation,
JVCIR(24), No. 7, 2013, pp. 846-856.
Elsevier DOI
1309
Steganalysis
BibRef
Mobasseri, B.G.[Bijan G.],
Marcinak, M.P.[Michael P.],
Data hiding in MPEG-2 bitstream by creating exceptions in code space,
SIViP(8), No. 2, February 2014, pp. 307-316.
WWW Link.
1402
BibRef
Qin, C.[Chuan],
Chang, C.C.[Chin-Chen],
Chiu, Y.P.[Yi-Ping],
A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and
Image Inpainting,
IP(23), No. 3, March 2014, pp. 969-978.
IEEE DOI
1403
data encapsulation
BibRef
Guo, Y.F.[Yuan-Fang],
Au, O.C.[Oscar C.],
Tang, K.[Ketan],
Pang, J.H.[Jia-Hao],
Hiding a Secret Pattern into Color Halftone Images,
IWDW13(465-474).
Springer DOI
1407
BibRef
Karimi, H.,
Shayesteh, M.G.,
Akhaee, M.A.,
Steganalysis of JPEG images using enhanced neighbouring joint density
features,
IET-IPR(9), No. 7, 2015, pp. 545-552.
DOI Link
1506
discrete cosine transforms
BibRef
Nikolaidis, A.,
Reversible data hiding in JPEG images utilising zero quantised
coefficients,
IET-IPR(9), No. 7, 2015, pp. 560-568.
DOI Link
1506
data compression
BibRef
Hua, G.,
Xiang, Y.,
Bi, G.,
When Compressive Sensing Meets Data Hiding,
SPLetters(23), No. 4, April 2016, pp. 473-477.
IEEE DOI
1604
Compressed sensing
BibRef
Bouslimi, D.[Dalel],
Coatrieux, G.[Gouenou],
Cozic, M.[Michel],
Roux, C.[Christian],
Data hiding in encrypted images based on predefined watermark
embedding before encryption process,
SP:IC(47), No. 1, 2016, pp. 263-270.
Elsevier DOI
1610
Data hiding
BibRef
Bouslimi, D.[Dalel],
Coatrieux, G.[Gouenou],
A crypto-watermarking system for ensuring reliability control and
traceability of medical images,
SP:IC(47), No. 1, 2016, pp. 160-169.
Elsevier DOI
1610
Decryption
BibRef
Freitas, P.G.[Pedro Garcia],
Farias, M.C.Q.[Mylène C.Q.],
Araújo, A.P.F.[Aletéia P.F.],
Hiding color watermarks in halftone images using maximum-similarity
binary patterns,
SP:IC(48), No. 1, 2016, pp. 1-11.
Elsevier DOI
1609
Color embedding
BibRef
Poljicak, A.[Ante],
Botella, G.[Guillermo],
Garcia, C.[Carlos],
Kedmenec, L.[Luka],
Prieto-Matias, M.[Manuel],
Portable real-time DCT-based steganography using OpenCL,
RealTimeIP(14), No. 1, January 2018, pp. 87-99.
Springer DOI
1802
BibRef
Qiu, Y.Q.[Ying-Qiang],
He, H.[Han],
Qian, Z.X.[Zhen-Xing],
Li, S.[Sheng],
Zhang, X.P.[Xin-Peng],
Lossless data hiding in JPEG bitstream using alternative embedding,
JVCIR(52), 2018, pp. 86-91.
Elsevier DOI
1804
Information hiding, Lossless data hiding, Reversible data hiding
BibRef
Hu, X.,
Ni, J.,
Shi, Y.Q.,
Efficient JPEG Steganography Using Domain Transformation of Embedding
Entropy,
SPLetters(25), No. 6, June 2018, pp. 773-777.
IEEE DOI
1806
data compression, discrete cosine transforms, entropy,
feature extraction, image coding, statistical analysis,
domain transformation
BibRef
Thai, T.H.[Thanh Hai],
Cogranne, R.[Remi],
Retraint, F.[Florent],
Statistical Model of Quantized DCT Coefficients:
Application in the Steganalysis of Jsteg Algorithm,
IP(23), No. 5, May 2014, pp. 1980-1993.
IEEE DOI
1405
BibRef
Earlier:
Steganalysis of Jsteg algorithm based on a novel statistical model of
quantized DCT coefficients,
ICIP13(4427-4431)
IEEE DOI
1402
discrete cosine transforms.
Digital Image Model
BibRef
Su, W.,
Ni, J.,
Li, X.,
Shi, Y.,
A New Distortion Function Design for JPEG Steganography Using the
Generalized Uniform Embedding Strategy,
CirSysVideo(28), No. 12, December 2018, pp. 3545-3549.
IEEE DOI
1812
Distortion, Discrete cosine transforms, Distortion measurement,
Transform coding, Complexity theory, Wavelet domain, Security,
distortion function
BibRef
Zhang, X.,
Peng, F.,
Long, M.,
Robust Coverless Image Steganography Based on DCT and LDA Topic
Classification,
MultMed(20), No. 12, December 2018, pp. 3223-3238.
IEEE DOI
1812
discrete cosine transforms, feature selection,
image classification, image sequences, statistical analysis,
discrete cosine transform
BibRef
Zhou, W.B.[Wen-Bo],
Li, W.X.[Wei-Xiang],
Chen, K.J.[Ke-Jiang],
Zhou, H.[Hang],
Zhang, W.M.[Wei-Ming],
Yu, N.H.[Neng-Hai],
Controversial 'pixel' prior rule for JPEG adaptive steganography,
IET-IPR(13), No. 1, January 2019, pp. 24-33.
DOI Link
1812
BibRef
Xue, Y.J.[Ying-Jie],
Liu, W.T.[Wan-Teng],
Lu, W.[Wei],
Yeung, Y.L.[Yui-Leong],
Liu, X.J.[Xian-Jin],
Liu, H.M.[Hong-Mei],
Efficient halftone image steganography based on dispersion degree
optimization,
RealTimeIP(16), No. 3, June 2019, pp. 601-609.
Springer DOI
WWW Link.
1906
BibRef
Feng, G.,
Zhang, X.,
Ren, Y.,
Qian, Z.,
Li, S.,
Diversity-Based Cascade Filters for JPEG Steganalysis,
CirSysVideo(30), No. 2, February 2020, pp. 376-386.
IEEE DOI
2002
Feature extraction, Transform coding, Discrete cosine transforms,
Histograms, Media, Indexes, Integrated circuits, Steganalysis,
cascade filter
BibRef
Su, A.,
Ma, S.,
Zhao, X.,
Fast and Secure Steganography Based on J-UNIWARD,
SPLetters(27), 2020, pp. 221-225.
IEEE DOI
2002
Fast, steganography, steganalysis, JPEG
BibRef
Yang, L.[Liran],
Zhong, J.[Jing],
Zhong, P.[Ping],
Xue, Y.M.[Yi-Ming],
Wen, J.[Juan],
A Novel Feature Selection Model for JPEG Image Steganalysis,
IWDW19(322-336).
Springer DOI
2003
BibRef
Chanu, O.B.[Oinam Bidyapati],
Neelima, A.[Arambam],
A new multi-secret image sharing scheme based on DCT,
VC(36), No. 5, May 2020, pp. 939-950.
WWW Link.
2005
BibRef
Li, Z.Y.[Zhen-Yu],
Bors, A.G.[Adrian G.],
Selection of Robust and Relevant Features for 3-D Steganalysis,
Cyber(50), No. 5, May 2020, pp. 1989-2001.
IEEE DOI
2005
BibRef
Earlier:
Selection of robust features for the Cover Source Mismatch problem in
3D steganalysis,
ICPR16(4256-4261)
IEEE DOI
1705
Feature extraction, Training, Shape, Robustness,
Machine learning algorithms, Machine learning, Data mining,
feature selection.
Correlation, Robustness, Testing, Training,
3D Steganalysis, Cover Source Mismatch.
BibRef
Li, Z.Y.[Zhen-Yu],
Beugnon, S.,
Puech, W.,
Bors, A.G.[Adrian G.],
Rethinking the high capacity 3D steganography:\
Increasing its resistance to steganalysis,
ICIP17(510-414)
IEEE DOI
1803
Data mining, Distortion, Face, Image edge detection,
Mathematical model, Resistance, steganalysis
BibRef
Li, Z.Y.[Zhen-Yu],
Gong, D.,
Liu, F.,
Bors, A.G.[Adrian G.],
3D Steganalysis Using the Extended Local Feature Set,
ICIP18(1683-1687)
IEEE DOI
1809
Feature extraction,
Laplace equations, Watermarking, Testing, Robustness,
information hiding
BibRef
Jia, J.[Ju],
Zhai, L.M.[Li-Ming],
Ren, W.X.[Wei-Xiang],
Wang, L.[Lina],
Ren, Y.Z.[Yan-Zhen],
Zhang, L.[Lefei],
Transferable heterogeneous feature subspace learning for JPEG
mismatched steganalysis,
PR(100), 2020, pp. 107105.
Elsevier DOI
2005
Mismatched steganalysis, Heterogeneous subspace,
Domain-independent features, Domain-related features, Transfer learning
BibRef
Li, W.,
Zhou, W.,
Zhang, W.,
Qin, C.,
Hu, H.,
Yu, N.,
Shortening the Cover for Fast JPEG Steganography,
CirSysVideo(30), No. 6, June 2020, pp. 1745-1757.
IEEE DOI
2006
Distortion, Transform coding, Security, Encoding, Additives,
Time complexity, Real-time systems, Steganography, JPEG images,
fast embedding
BibRef
Li, W.,
Chen, K.,
Zhang, W.,
Zhou, H.,
Wang, Y.,
Yu, N.,
JPEG Steganography With Estimated Side-Information,
CirSysVideo(30), No. 7, July 2020, pp. 2288-2294.
IEEE DOI
2007
Transform coding, Distortion, Security, Noise reduction, Additives,
Modulation, Discrete cosine transforms, Steganography, JPEG images,
deblocking
BibRef
Xia, C.[Chao],
Guan, Q.X.[Qing-Xiao],
Zhao, X.F.[Xian-Feng],
Wu, K.[Keke],
Improved JPEG Phase-Aware Steganalysis Features Using Multiple Filter
Sizes and Difference Images,
CirSysVideo(30), No. 11, November 2020, pp. 4100-4113.
IEEE DOI
2011
Transform coding, Feature extraction, Discrete cosine transforms,
Convolution, Histograms, Gabor filters, Distortion, Steganalysis,
JPEG
BibRef
Zhu, J.[Jie],
Guan, Q.X.[Qing-Xiao],
Zhao, X.F.[Xian-Feng],
Multi-class JPEG Image Steganalysis by Ensemble Linear SVM Classifier,
IWDW14(470-484).
Springer DOI
1602
BibRef
Qiu, Y.,
Qian, Z.,
He, H.,
Tian, H.,
Zhang, X.,
Optimized Lossless Data Hiding in JPEG Bitstream and Relay
Transfer-Based Extension,
CirSysVideo(31), No. 4, April 2021, pp. 1380-1394.
IEEE DOI
2104
Transform coding, Relays, Media, Image coding, Information science,
Discrete cosine transforms, Cryptography,
embedding capacity
BibRef
Wang, Y.F.[Yao-Fei],
Li, W.X.[Wei-Xiang],
Zhang, W.M.[Wei-Ming],
Yu, X.Z.[Xin-Zhi],
Liu, K.L.[Kun-Lin],
Yu, N.H.[Neng-Hai],
BBC++: Enhanced Block Boundary Continuity on Defining Non-Additive
Distortion for JPEG Steganography,
CirSysVideo(31), No. 5, 2021, pp. 2082-2088.
IEEE DOI
2105
BibRef
Agrawal, R.[Rohit],
Ahuja, K.[Kapil],
CSIS: Compressed sensing-based enhanced-embedding capacity image
steganography scheme,
IET-IPR(15), No. 9, 2021, pp. 1909-1925.
DOI Link
2106
BibRef
Damghani, H.[Hamidreza],
Mofrad, F.B.[Farshid Babapour],
Damghani, L.[Leila],
Medical JPEG image steganography method according to the distortion
reduction criterion based on an imperialist competitive algorithm,
IET-IPR(15), No. 3, 2021, pp. 705-714.
DOI Link
2106
BibRef
Lu, W.[Wei],
Zhang, J.H.[Jun-Hong],
Zhao, X.F.[Xian-Feng],
Zhang, W.M.[Wei-Ming],
Huang, J.W.[Ji-Wu],
Secure Robust JPEG Steganography Based on AutoEncoder With Adaptive
BCH Encoding,
CirSysVideo(31), No. 7, July 2021, pp. 2909-2922.
IEEE DOI
2107
Image coding, Transform coding, Robustness,
Discrete cosine transforms, Security, Receivers, Error analysis,
BCH encoding
BibRef
Yin, X.L.[Xiao-Lin],
Lu, W.[Wei],
Liu, W.[Wanteng],
Guo, J.M.[Jing-Ming],
Huang, J.W.[Ji-Wu],
Shi, Y.Q.[Yun-Qing],
Reversible Data Hiding in Halftone Images Based on Dynamic Embedding
States Group,
CirSysVideo(31), No. 7, July 2021, pp. 2631-2645.
IEEE DOI
2107
Visualization, Distortion, Image coding, Table lookup, Payloads,
Markov processes, Histograms, Halftone images,
Markov transition
BibRef
Luo, W.W.[Wei-Wei],
Zhou, W.P.[Wen-Peng],
Fang, J.L.[Jing-Long],
Fan, L.Y.[Ling-Yan],
JPEG Image Steganalysis Using Weight Allocation from Block Evaluation,
IEICE(E105-D), No. 1, January 2022, pp. 180-183.
WWW Link.
2201
BibRef
Zhang, J.[Jimin],
Zhao, X.F.[Xian-Feng],
He, X.L.[Xiao-Lei],
Zhang, H.[Hong],
Improving the Robustness of JPEG Steganography With Robustness Cost,
SPLetters(29), 2022, pp. 164-168.
IEEE DOI
2202
Robustness, Discrete cosine transforms, Transform coding,
Steganography, Costs, Distortion, Social networking (online),
JPEG recompression
BibRef
Tang, W.X.[Wei-Xuan],
Li, B.[Bin],
Barni, M.[Mauro],
Li, J.[Jin],
Huang, J.W.[Ji-Wu],
Improving Cost Learning for JPEG Steganography by Exploiting JPEG
Domain Knowledge,
CirSysVideo(32), No. 6, June 2022, pp. 4081-4095.
IEEE DOI
2206
Costs, Discrete cosine transforms, Transform coding, Steganography,
Correlation, Complexity theory, Additives, JPEG steganography,
automatic cost learning
BibRef
Lu, W.[Wei],
Chen, J.J.[Jun-Jia],
Zhang, J.H.[Jun-Hong],
Huang, J.W.[Ji-Wu],
Weng, J.[Jian],
Zhou, Y.C.[Yi-Cong],
Secure Halftone Image Steganography Based on Feature Space and Layer
Embedding,
Cyber(52), No. 6, June 2022, pp. 5001-5014.
IEEE DOI
2207
Distortion, Security, Media, Gray-scale,
Frequency division multiplexing, Cybernetics,
syndrome-trellis codes (STCs)
BibRef
Liu, Z.Y.[Zi-Yu],
Yi, X.W.[Xiao-Wei],
Zhao, X.F.[Xian-Feng],
Yang, Y.Z.[Yun-Zhao],
Content-Aware Robust JPEG Steganography for Lossy Channels Using
LPCNet,
SPLetters(29), 2022, pp. 2253-2257.
IEEE DOI
2212
Feature extraction, Speech coding, Social networking (online),
Robustness, Cepstrum, Transform coding, Speech synthesis,
social networks
BibRef
Zhang, J.S.[Jian-Song],
Chen, K.J.[Ke-Jiang],
Qin, C.[Chuan],
Zhang, W.M.[Wei-Ming],
Yu, N.H.[Neng-Hai],
Distribution-Preserving-Based Automatic Data Augmentation for Deep
Image Steganalysis,
MultMed(24), 2022, pp. 4538-4550.
IEEE DOI
2212
Task analysis, Feature extraction, Training, Convolution, Payloads,
Steganography, Databases, Image, steganography, steganalysis, data augmentation
BibRef
Puteaux, P.[Pauline],
Yriarte, F.[Félix],
Puech, W.[William],
A Secret JPEG Image Sharing Method Over GF(2M) Galois Fields,
CirSysVideo(33), No. 6, June 2023, pp. 3030-3042.
IEEE DOI
2306
Transform coding, Image coding, Visualization, Galois fields,
Encryption, Image reconstruction, Multimedia security,
JPEG compression
BibRef
Wang, Z.C.[Zi-Chi],
Feng, G.R.[Guo-Rui],
Qian, Z.X.[Zhen-Xing],
Zhang, X.P.[Xin-Peng],
JPEG Steganography With Content Similarity Evaluation,
Cyber(53), No. 8, August 2023, pp. 5082-5093.
IEEE DOI
2307
Transform coding, Distortion, Steganography,
Discrete cosine transforms, Costs, Feature extraction,
Steganography
BibRef
Chen, B.[Beijing],
Nie, Y.X.[Yu-Xin],
Yang, J.H.[Jian-Hua],
Toward high imperceptibility deep JPEG steganography based on sparse
adversarial attack,
JVCIR(97), 2023, pp. 103977.
Elsevier DOI Code:
WWW Link.
2312
JPEG, Steganography, Adversarial attack, Deep neural network, Steganalysis
BibRef
Wu, Y.[Yue],
Meng, G.[Guotao],
Chen, Q.F.[Qi-Feng],
Embedding Novel Views in a Single JPEG Image,
ICCV21(14499-14507)
IEEE DOI
2203
Image coding, Codes, Image color analysis, Convolution,
Transform coding, Prediction methods, Image and video synthesis,
BibRef
Quan, X.M.[Xiao-Mei],
JPEG Steganalysis Based on Local Dimension Estimation,
ICIVC21(306-311)
IEEE DOI
2112
Manifolds, Art, Digital forensics, Transform coding, Estimation,
Manifold learning, steganalysis, manifold learning, local dimension estimation
BibRef
Ma, S.[Sai],
Zhao, X.F.[Xian-Feng],
Generating JPEG Steganographic Adversarial Example via Segmented
Adversarial Embedding,
IWDW20(68-79).
Springer DOI
2103
BibRef
Ruiz, H.[Hugo],
Yedroudj, M.[Mehdi],
Chaumont, M.[Marc],
Comby, F.[Frédéric],
Subsol, G.[Gérard],
LSSD: A Controlled Large JPEG Image Database for Deep-learning-based
Steganalysis 'into the Wild',
MMForWild20(470-483).
Springer DOI
2103
BibRef
Lu, Y.[Yubo],
Zhai, L.M.[Li-Ming],
Wang, L.[Lina],
Designing Non-additive Distortions for JPEG Steganography Based on
Blocking Artifacts Reduction,
IWDW19(268-280).
Springer DOI
2003
BibRef
Malik, A.[Asad],
Wang, H.X.[Hong-Xia],
Khan, A.N.[Ahmad Neyaz],
Chen, Y.L.[Yan-Li],
Chen, Y.[Yi],
A Novel Lossless Data Hiding Scheme in Homomorphically Encrypted Images,
IWDW19(213-220).
Springer DOI
2003
BibRef
Zheng, H.L.[Hui-Lin],
Li, X.[Xuan],
Ruan, D.Y.[Dan-Yang],
Kang, X.G.[Xian-Gui],
Shi, Y.Q.[Yun-Qing],
Comparison of DCT and Gabor Filters in Residual Extraction of CNN Based
JPEG Steganalysis,
IWDW18(29-39).
Springer DOI
1905
BibRef
Bonnet, B.[Benoît],
Furon, T.[Teddy],
Bas, P.[Patrick],
Forensics Through Stega Glasses: The Case of Adversarial Images,
MMForWild20(453-469).
Springer DOI
2103
BibRef
Taburet, T.[Théo],
Filstroff, L.[Louis],
Bas, P.[Patrick],
Sawaya, W.[Wadih],
An Empirical Study of Steganography and Steganalysis of Color Images in
the JPEG Domain,
IWDW18(290-303).
Springer DOI
1905
BibRef
Feng, C.,
Kong, X.,
Li, M.,
Yang, Y.,
Guo, Y.,
Contribution-based feature transfer for JPEG mismatched steganalysis,
ICIP17(500-504)
IEEE DOI
1803
Correlation, Kernel, Media, Q-factor, Testing, Training,
Transform coding, JPEG image, Mismatched steganalysis,
feature transfer
BibRef
Wazirali, R.,
Chaczko, Z.,
Perceptual threshold in DWT for optimum embedding rate in data hiding
using HVS and GA,
ICVNZ15(1-8)
IEEE DOI
1701
data protection
BibRef
Ait Saadi, K.,
Zebbiche, K.,
Laadjel, M.,
Morsli, M.A.,
Real time watermarking to authenticate the WSQ bitstream,
IPTA12(239-243)
IEEE DOI
1503
image coding
Wavelet-packet Scalar Quantization.
BibRef
Imaizumi, S.[Shoko],
Ozawa, K.[Kei],
Multibit Embedding Algorithm for Steganography of Palette-Based Images,
PSIVT13(99-110).
Springer DOI
1402
BibRef
Li, X.F.[Xiao-Feng],
Kong, X.W.[Xiang-Wei],
Wang, B.[Bo],
Guo, Y.Q.[Yan-Qing],
You, X.G.[Xin-Gang],
Generalized transfer component analysis for mismatched JPEG
steganalysis,
ICIP13(4432-4436)
IEEE DOI
1402
domain alignment; mismatch; steganalysis; transfer component analysis
BibRef
Sachnev, V.[Vasily],
Kim, H.J.[Hyoung Joong],
An Improved Matrix Encoding Scheme for JPEG Steganography,
IWDW11(3-15).
Springer DOI
1208
BibRef
Earlier:
Ternary Data Hiding Technique for JPEG Steganography,
DW10(202-210).
Springer DOI
1010
BibRef
Sachnev, V.[Vasiliy],
Kim, H.J.[Hyoung Joong],
Zhang, R.Y.[Rong-Yue],
Choi, Y.S.[Yong Soo],
A Novel Approach for JPEG Steganography,
DW08(209-217).
Springer DOI
0811
BibRef
Huang, F.J.[Fang-Jun],
Shi, Y.Q.[Yun Qing],
Huang, J.W.[Ji-Wu],
New JPEG Steganographic Scheme with High Security Performance,
DW10(189-201).
Springer DOI
1010
BibRef
Nataraj, L.,
Sarkar, A.,
Manjunath, B.S.,
Precise localization of key-points to identify local regions for robust
data hiding,
ICIP10(3681-3684).
IEEE DOI
1009
BibRef
Leng, C.K.[Chiew Kang],
Pieprzyk, J.,
Features-Pooling Blind JPEG Image Steganalysis,
DICTA08(96-103).
IEEE DOI
0812
BibRef
Lin, J.Q.[Jing-Qu],
Wang, X.D.[Xiao-Dong],
Zhong, S.P.[Shang-Ping],
Reduction of Markov Extended Features in JPEG Image Steganalysis,
CISP09(1-5).
IEEE DOI
0910
BibRef
Li, L.[Leida],
Guo, B.L.[Bao-Long],
Pan, J.S.[Jeng-Shyang],
Yang, L.[Liu],
Scale-Space Feature Based Image Watermarking in Contourlet Domain,
DW08(88-102).
Springer DOI
0811
BibRef
Khan, Z.[Zohaib],
Mansoor, A.B.[Atif Bin],
A New Hybrid DCT and Contourlet Transform Based JPEG Image Steganalysis
Technique,
SCIA09(321-330).
Springer DOI
0906
BibRef
And:
Steganalysis of JPEG Images with Joint Transform Features,
PSIVT09(965-975).
Springer DOI
0901
BibRef
Barbier, J.[Johann],
Mayoura, K.[Kichenakoumar],
Steganalysis of Multi Bit Plane Image Steganography,
DW07(99-111).
Springer DOI
0712
BibRef
Barbier, J.[Johann],
Filiol, É.[Éric],
Mayoura, K.[Kichenakoumar],
Universal JPEG Steganalysis in the Compressed Frequency Domain,
DW06(253-267).
Springer DOI
0611
BibRef
Dong, J.[Jing],
Wang, W.[Wei],
Tan, T.N.[Tie-Niu],
Multi-class Blind Steganalysis Based on Image Run-Length Analysis,
DW09(199-210).
Springer DOI
0908
BibRef
Dong, J.[Jing],
Tan, T.N.[Tie-Niu],
Blind Image Steganalysis Based on Run-Length Histogram Analysis,
ICIP08(2064-2067).
IEEE DOI
0810
BibRef
Jiang, W.[Weina],
Ho, A.T.S.,
Treharne, H.,
Least Distortion Halftone Image Data Hiding Watermarking by Optimizing
an Iterative Linear Gain Control Model,
DW07(423-439).
Springer DOI
0712
BibRef
Wang, P.[Ping],
Liu, F.L.[Fen-Lin],
Wang, G.D.[Guo-Dong],
Sun, Y.F.[Yi-Feng],
Gong, D.F.[Dao-Fu],
Multi-class steganalysis for Jpeg stego algorithms,
ICIP08(2076-2079).
IEEE DOI
0810
BibRef
Huang, F.J.[Fang-Jun],
Li, B.[Bin],
Huang, J.W.[Ji-Wu],
Universal JPEG steganalysis based on microscopic and macroscopic
calibration,
ICIP08(2068-2071).
IEEE DOI
0810
BibRef
Huang, F.J.[Fang-Jun],
Zhong, Y.[Yane],
Huang, J.W.[Ji-Wu],
Improved Algorithm of Edge Adaptive Image Steganography Based on LSB
Matching Revisited Algorithm,
IWDW13(19-31).
Springer DOI
1407
BibRef
Huang, F.J.[Fang-Jun],
Li, B.[Bin],
Huang, J.W.[Ji-Wu],
Attack LSB Matching Steganography by Counting Alteration Rate of the
Number of Neighbourhood Gray Levels,
ICIP07(I: 401-404).
IEEE DOI
0709
BibRef
Li, B.[Bin],
Huang, F.J.[Fang-Jun],
Huang, J.W.[Ji-Wu],
Steganalysis of LSB Greedy Embedding Algorithm for JPEG Images using
Coefficient Symmetry,
ICIP07(I: 413-416).
IEEE DOI
0709
BibRef
Choi, H.J.[Hyun-Jun],
Seo, Y.H.[Young-Ho],
Yoo, J.S.[Ji-Sang],
Kim, D.W.[Dong-Wook],
An Electronic Watermarking Technique for Digital Holograms in a DWT
Domain,
PSIVT06(1007-1017).
Springer DOI
0612
BibRef
Damnjanovic, I.[Ivan],
Izquierdo, E.[Ebroul],
Capacity Enhancement of Compressed Domain Watermarking Channel Using
Duo-binary Coding,
DW06(162-176).
Springer DOI
0611
BibRef
Dong, J.[Jing],
Wang, W.[Wei],
Tan, T.N.[Tie-Niu],
Shi, Y.Q.[Yun Q.],
Run-Length and Edge Statistics Based Approach for Image Splicing
Detection,
DW08(76-87).
Springer DOI
0811
BibRef
Shi, Y.Q.[Yun Q.],
Chen, C.H.[Chun-Hua],
Xuan, G.R.[Guo-Rong],
Su, W.[Wei],
Steganalysis Versus Splicing Detection,
DW07(158-172).
Springer DOI
0712
BibRef
Chen, C.H.[Chun-Hua],
Shi, Y.Q.[Yun Q.],
Chen, W.[Wen],
Xuan, G.R.[Guo-Rong],
Statistical Moments Based Universal Steganalysis using JPEG 2-D Array
and 2-D Characteristic Function,
ICIP06(105-108).
IEEE DOI
0610
BibRef
Tan, S.Q.[Shun-Quan],
Huang, J.W.[Ji-Wu],
Shi, Y.Q.[Yun Q.],
Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang
Transform Based Sequential Analysis,
DW07(112-126).
Springer DOI
0712
BibRef
Li, B.[Bin],
Huang, F.J.[Fang-Jun],
Tan, S.Q.[Shun-Quan],
Huang, J.W.[Ji-Wu],
Shi, Y.Q.[Yun Q.],
Effect of Different Coding Patterns on Compressed Frequency Domain
Based Universal JPEG Steganalysis,
DW07(143-157).
Springer DOI
0712
BibRef
Tan, S.Q.[Shun-Quan],
Huang, J.W.[Ji-Wu],
Yang, Z.H.[Zhi-Hua],
Shi, Y.Q.,
Steganalysis of JPEG2000 Lazy-Mode Steganography using the
Hilbert-Huang Transform Based Sequential Analysis,
ICIP06(101-104).
IEEE DOI
0610
BibRef
Quan, X.M.[Xiao-Mei],
Zhang, H.B.[Hong-Bin],
Data Hiding in MPEG Compressed Audio Using Wet Paper Codes,
ICPR06(IV: 727-730).
IEEE DOI
0609
BibRef
Kimoto, T.,
Designing Template Cells Suitable for Secret-Sharing Halftone Images by
Quantitative Analysis,
ICIP06(2593-2596).
IEEE DOI
0610
BibRef
Earlier:
Implementation of Level Transformations for Hiding Watermarks in Image
Bit-Planes under Limited Level Changes,
ICIP05(I: 253-256).
IEEE DOI
0512
BibRef
Ratha, N.K.[Nalini K.],
Figueroa-Villanueva, M.A.[Miguel A.],
Connell, J.H.[Jonathan H.],
Bolle, R.M.[Ruud M.],
A Secure Protocol for Data Hiding in Compressed Fingerprint Images,
BioAW04(205-216).
Springer DOI
0505
BibRef
Lin, S.D.[Shinfeng D.],
Shie, S.C.[Shih-Chieh],
Chou, C.C.[Chung-Chien],
A suitable image hiding scheme for jpeg images,
ICIP04(III: 1565-1568).
IEEE DOI
0505
BibRef
Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Surveys, Image Hiding, Data Hiding, Steganography .