10
Views
0
CrossRef citations to date
0
Altmetric
Articles

Novel colour image-hiding scheme using error diffusion technique

Pages 11-22 | Published online: 18 Jul 2013

REFERENCES

  • Bourbakits, N. and Alexopoulos, C. Picture data encryption using scan patterns. Pattern Recognition, 1992, 25, 567–581.
  • National Bureau of Standards (US). DES Encryption Standard (DES). Federal Information Processing Standards Publication 46, 1997 (National Technical Information Service, Springfield, VA).
  • Rivest, R., Shamir, A. and Adleman, L. A method for obtaining digital signatures and public-key-cryptosystems. Communications of the ACM, 1978, 21, 120–126.
  • Lou, D. C. and Liu, J. L. Steganographic method for secure communications. Comput. Security, 2003, 21, 449–460.
  • Katzenbeisser, S. and Petitcolas, F. A. P. Information Hiding Techniques for Steganography and Digital Watermarking, 2000 (Artech House).
  • Lee, Y. K. and Chen, L. H. High capacity image steganographic model. IEE Proc. Vision Image Signal Process., 2000, 147, 288–294.
  • Chang, C. C. and Hwang, K. F. Hiding images using dynamic bit-replacement and human visual system. In Distributed Multimedia Databases: Techniques and Applications (Ed. T. K. Shih), 2001, Chap. 16, pp. 190–205 (Idea Group Publishing).
  • Wu, D. C. and Tsai, W. H. Spatial-domain image hiding using an image differencing. IEE Proc. Vision Image Signal Process., 2000, 147, 29–37.
  • Wang, R. Z., Lin, C. F. and Lin, J. C. Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition, 2001, 34, 671–683.
  • Chang, C. C., Hsiao, J. Y. and Chan, C. S. Finding optimal LSB substitution in image hiding by using dynamic programming strategy. Pattern Recognition, 2003, 36, 1583–1595.
  • Chang, C. C., Chen, T. S. and Chung, L. Z. A steganographic method based upon JPEG and quantization table modification. Inf. Sci., 2002, 141, 123–138.
  • Kawaguchi, E. and Eason, R. O. The principle and applications of BPCS-steganography. In Voice, Video and Data Communications, Proc. SPIE, 1998, Vol. 3528, pp. 464–473 (SPIE, Bellingham, WA).
  • Hirohisa, H. A data embedding method using BPCS principle with new complexity measures. Proc. Pacific Rim Workshop on Digital Steganography, 2002, Kitakyushu, Kyushu Institute of Technology, pp. 30–47.
  • Spaulding, J., Noda, H., Shirazi, M. N. and Kawaguchi, E. BPCS steganography using EZW lossy compressed images. Pattern Recognition Lett., 2002, 23, 1579–1587.
  • Noda, H., Spaulading, J., Shirazi, M. N. and Kawaguchi, E. Application of bit-plane decomposition steganography to JPEG2000 encoded image. IEEE Signal Process. Lett., 2003, 9, 410–413.
  • Srinivasan, Y., Nutter, B., Mitra, S., Phillips, B., Feris, D. Secure transmission of medical records using high capacity steganography. Proc. IEEE Conf. on Computer Based Medical Systems, Maryland, June 2004, pp. 122–127 (IEEE, Piscataway, NJ).
  • Chen, T. S., Chang, C. C. and Hwang, M. S. A virtual image cryptosystem based upon vector quantization. IEEE Trans, Image Process., 1998, 7, 1485–1488.
  • Chung, K. L., Shen, C. H., Chang, L. C. A novel SVD- and VQ-based image hiding scheme. Pattern Recognition Lett., 2001, 22, 1051–1058.
  • Lin, M. H., Hu, Y. C. and Chang, C. C. Both color and gray scale secret images hiding in a color image. Int. J. Pattern Recognition Artif. Intell., 2002, 16, 697–713.
  • Chang, P. C., Yu, C. S. and Lee, T. H. Hybrid LMS-MMSE inverse halftoning technique. IEEE Trans. Image Process., 2001, 10, 95–103.
  • Mese, M. and Vaidyanathan, P. P. Tree-structured method for LUT inverse halftoning and for image halftoning. IEEE Trans. Image Process., 2002, 11, 644–655.
  • Damera-Venkata, N., Evans, B. L. and Monga, V. Color error-diffusion halftoning. IEEE Signal Process. Mag., 2003, July, 12–13.
  • Wong, P. W. and Memon, N. D. Image processing for halftones. IEEE Signal Process. Mag., 2003, July, 59–70.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.