REFERENCES
- Bender, W., Gruhl, D., Morimoto, N. and Lu, A. Techniques for data hiding. IBM System J., 1996, 35(3), 313–336.
- Bourbakis, N. and Alexpoulos, C. Picture data encryption using scan patterns. Pattern Recognition, 1992, 26(6), 567–581.
- Chang, H. K. and Liou, J. L. An image encryption scheme based on quadtree compression scheme. In Proceedings of International Computer Symposium, Taiwan, Vol. 1, 1994, pp. 230–237.
- Chen, T. S., Chang, C. C. and Hwang, M. S. A virtual image cryptosystem based upon vector quantization. IEEE Trans, on Image Processing, 1998, 7(10), 1485–1488.
- Liaw, M. S. and Chen, L. H. An effective data hiding method. In Proceedings of the Sixth National Conference on Science and Technology of National Defense, Taoyuan, Taiwan, Vol. 2, 1997, pp. 534–540.
- Swason, M. D., Kobayashi, M. and Tewfik, A. H. Multimedia data embedding and watermarking techniques. Proc. IEEE, 1998, 86(6), 1064–1087.
- Wu, D. C. and Tsai, W. H. Data hiding in image via multiple-based number conversion. IEEE Trans, on Consumer Electronics, 1998, 44(4), 1406–1412.
- NBS FIPS PUB 46 Data Encryption Standard, 1997 (National Bureau of Standards, US Department of Commerce).
- Gonzalez, R. C. and Woods, R. E. Digital Image Processing, 1992 (Addison-Wesley, Reading, Massachusetts).
- Linde, Y., Buzo, A. and Gray, R. M. An algorithm for vector quantization. IEEE Trans, on Communications, 1980, 28, 84–95.
- Denning, D. E. R. Cryptography and Data Security, 1983 (Addison-Wesley, Reading, Massachusetts).
- Nelson, M. and Gailly, J. L. The Data Compression Book, 1995 (M&T Books, New York).