REFERENCES
- Johnson, N. E. and Jajodia, S. Exploring steganogra- phy: seeing the unseen. Comput. Pract., 1998, 31, 26–34.
- Zollner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G. and Wolf, G. Modeling the security of steganographic systems. Lect. Notes Comput. Sci., 1998, 1525, 345–355.
- Wu, D. C. and Tsai, W. H. A steganographic method for images by pixel-value differencing. Patt. Recogn. Lett, 2003, 24, 1613–1626.
- Wu, H. C., Wu, N. I., Tsai, C. S. and Hwang, M. S. Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proc., Visual Image Signal Process., 2005, 152, 611–615.
- Wang, C. M., Wu, N. I., Tsai, C. S. and Hwang, M. S. A high quality steganographic method with pixel-value differencing and modulus function. J. Syst. Software, 2008, 81, 150–158.
- Chan, C. K. and Cheng, L. M. Hiding data in images by simple LSB substitution. Patt. Recogn., 2004, 37, 469–474.
- Chang, C. C., Lin, M. H. and Hu, Y. C. A fast and secure image hiding scheme based on LSB substitution. Int. J. Patt. Recogn. Artif. Intell., 2002, 16, 399–416.
- Wang, R. Z., Lin, C. F. and Lin, J. C. Image hiding by optimal LSB substitution and genetic algorithm. Patt. Recogn., 2001, 34, 671–683.
- Thien, C. C. and Lin, J. C. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Patt. Recogn., 2003, 36, 2876–2881.
- Tseng, H. W. and Hsieh, C. P. Reversible data hiding based on image histogram modification. Imag. Sci.iJ., 2008, 56, 271–278.
- Gonzalez, R. C. and Woods, R. E. Digital Image Processing, 2002 (Prentice Hall, Upper Saddle River, NJ).
- Anderson, R. J. and Petitcolas, F. A. P. On the limits of steganography. IEEE J. Selected Areas Commun., 1998, 16, 474–481.
- Hsiao, J. Y. and Chang, C. T. Steganographic scheme for digital images using difference in neighbouring pixels. Imag. Sci.iJ., 2008, 56, 291–299.
- Wang, Z. A universal image quality index. IEEE Signal Process. Lett., 2002, 9, 81–84.
- Lin, C. N., Chang, C. C. and Chan, Y. K. Data hiding on two stage VQ compression codes. Imag. Sci.iJ., 2008, 56, 342–350.
- Wang, R. Z. and Su, C. H. Secret image sharing with smaller shadow images. Patt. Recogn. Lett., 2005, 27, 551–555.
- Petitcolas, F. A. P., Anderson, R. J. and Kuhn, M. G. Information hiding – a survey. Proc. IEEE, 1999, 87, 1062–1078.
- Shie, S. C., Lin, S. D. and Jiang, J. H. Image steganographic scheme using predictive side match vector quantisation. Imag. Sci. J., 2008, 56, 123–135.
- Liu, J. C. and Shih, M. H. Generalizations of pixel-value differencing steganography for data hiding in images. Fundam. Inform., 2008, 83, 319–335.
- Liaoa, K. C., Leea, W. B. and Liaob, C. W. Security of fragile watermarking scheme for image authentication. Imag. Sci. J, 2006, 54, 129–133.
- Lin, I. C., Lin, Y. B. and Wang, C. M. Hiding data in spatial domain images with distortion tolerance. Comput. Stand. Interf., 2009, 31, 458–464.
- Lee, I. S. and Tsai, W. H. Data hiding in grayscale images by dynamic programming based on a human visual model. Patt. Recogn., 2009, 42, 1604–1611.