REFERENCES
- Amin PK, Liu N, Subbalakshmi KP. Statistical attack resilient data hiding. Int. J. Network Secur., 2007, 5, 112–120.
- Barton JM. “Method and apparatus for embedding authentication information within digital data”, US Patent 5,646,997, 1997.
- Chan CK, Cheng LM. Hiding data in images by simple LSB substitution. Patt. Recogn., 2004, 37, 469–474.
- Chang CC, Kieu D, Chou YC. Reversible information hiding for VQ indices based on locally adaptive coding. J. Visual Commun. Image Represent., 2009, 20, 57–64.
- Chang CC, Tai WL, Lin CC. A reversible data hiding scheme based on side match vector quantization. IEEE Trans. Circuits Syst. Video Technol., 2006, 16, 1301–1308.
- Chang CC, Wu WC. A steganographic method for hiding secret data using side match vector quantization. IEICE Trans. Inform. Syst., 2005, E88-D, 2159–2167.
- Feng JB, Lin IC, Tsai CS, Chu YP. Reversible watermarking: current status and key issues. Int. J. Network Secur., 2006, 2, 161–170.
- Gersho A, Gray RM. Vector Quantization and Signal Compression, 1992 (Kluwer Academic Publishers, Boston, MA).
- Gray RM. “Vector quantization”, IEEE ASSP Mag., 1984, 1, 4–29.
- Hsiao JY, Chen JF, Chang JM. An adaptive reversible information hiding method based on search-order coding for VQ-compressed images. Imag. Sci. J., 2009, 57, 37–45.
- Kim T. Side match and overlap match vector quantizers for images. IEEE Trans. Image Process., 1992, 1, 170–185.
- Lee CF, Chen KN, Chang CC. A new data hiding strategy with restricted region protection. Imag. Sci. J., 2009, 57, 235–249.
- Liao Z, Huang Y, Li C. Research on data hiding capacity. Int. J. Network Secur., 2007, 5, 140–144.
- Linde Y, Buzo A, Gray RM. An algorithm for vector quantizer design. IEEE Trans. Commun., 1980, 28, 84–95.
- Liu Y, Sun X, Cox IJ, Wang H. Natural language information hiding based on Chinese mathematical expression. Int. J. Network Secur., 2009, 8, 10–15.
- Pennebaker WB, Mitchell JL. The JPEG Still Image Data Compression Standard, 1993 (Kluwer Academic Publishers, Boston, CA).
- Taubman DS, Marcellin MW. JPEG2000: Image Compression Fundamentals Standards and Practice, 2002 (Kluwer Academic Publishers, Boston, CA).
- Wang CM, Wu N, Tsai CS, Hwang MS. A high quality steganographic method with pixel-value differencing and modulus function. J. Syst. Software, 2008, 81, 150–158.
- Wu NI, Hwang MS. Data hiding: current status and key issues. Int. J. Network Secur., 2007, 4, 1–9.
- Xinag S, Huang J. Analysis of quantization-based audio watermarking to D/A and A/D conversions. Int. J. Network Secur., 2006, 3, 230–238.
- Xuan G, Zhu J, Chen J, Shi YQ, Ni Z, Su W. Distortionless data hiding based on integer wavelet transform. Electron. Lett., 2002, 38, 1646–1648.