10
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Image steganography using vector quantization and discrete cosine transform

, &
Pages 205-215 | Received 05 Jul 2000, Accepted 29 Mar 2001, Published online: 06 Oct 2016

REFERENCES

  • Bender, W., Gruhl, D., Morimoto, N. and Lu, A. Techniques for data hiding. IBM System J., 1996, 35(3), 313–336.
  • Bourbakis, N. and Alexpoulos, C. Picture data encryption using scan patterns. Pattern Recognition, 1992, 26(6), 567–581.
  • Chang, H. K. and Liou, J. L. An image encryption scheme based on quadtree compression scheme. In Proceedings of International Computer Symposium, Taiwan, Vol. 1, 1994, pp. 230–237.
  • Chen, T. S., Chang, C. C. and Hwang, M. S. A virtual image cryptosystem based upon vector quantization. IEEE Trans, on Image Processing, 1998, 7(10), 1485–1488.
  • Liaw, M. S. and Chen, L. H. An effective data hiding method. In Proceedings of the Sixth National Conference on Science and Technology of National Defense, Taoyuan, Taiwan, Vol. 2, 1997, pp. 534–540.
  • Swason, M. D., Kobayashi, M. and Tewfik, A. H. Multimedia data embedding and watermarking techniques. Proc. IEEE, 1998, 86(6), 1064–1087.
  • Wu, D. C. and Tsai, W. H. Data hiding in image via multiple-based number conversion. IEEE Trans, on Consumer Electronics, 1998, 44(4), 1406–1412.
  • NBS FIPS PUB 46 Data Encryption Standard, 1997 (National Bureau of Standards, US Department of Commerce).
  • Gonzalez, R. C. and Woods, R. E. Digital Image Processing, 1992 (Addison-Wesley, Reading, Massachusetts).
  • Linde, Y., Buzo, A. and Gray, R. M. An algorithm for vector quantization. IEEE Trans, on Communications, 1980, 28, 84–95.
  • Denning, D. E. R. Cryptography and Data Security, 1983 (Addison-Wesley, Reading, Massachusetts).
  • Nelson, M. and Gailly, J. L. The Data Compression Book, 1995 (M&T Books, New York).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.