4
Views
1
CrossRef citations to date
0
Altmetric
Articles

Scheme for hiding images by finding optimal one-to-two substitution table using dynamic programming strategy

Pages 13-22 | Published online: 18 Jul 2013

References

  • Chu, Y. H. and Chang, S. Dynamical cryptography based on synchronized chaotic systems. Electron. Lett., 1999, 35, 974–975.
  • Highland, H. J. Data encryption: a non-mathematical approach. Computer Security, 1997, 16, 369–386.
  • Bender, D. W., Gruhl, N. M. and Lu, A. Techniques for data hiding. IBM Syst. J., 1996, 35, 313–336.
  • Chun, W. D. and Hsiang, T. E. Data hiding in images via multiple-based number conversion and lossy compression. IEEE Trans. Consumer Electron., 1998, 44, 1406–1412.
  • Chen, L. H. and Lin, J. J. Mean quantization based image watermarking. Image Vision Comput., 2003, 21, 717–727.
  • Chang, C. C. and Chan, C. S. A watermarking scheme based on principal component analysis technique. Informatica, 2003, 14, 431–444.
  • Lin, S. D. and Chen, C. F. A robust DCT-based watermarking for copyright protection. IEEE Trans. Consumer Electron., 2000, 46, 415–421.
  • Maniccam, S. S. and Bourbakis, N. Lossless compression and information hiding in images. Pattern Recognition, 2004, 37, 475–486.
  • Spaulding, J., Noda, H., Shirazi, M. and Kawaguchi, E. BPCS steganography using EZW lossy compressed images. Pattern Recognition Lett., 2002, 23, 1579–1587.
  • Wu, M. Y., Ho, Y. K. and Lee, J. H. An iterative method of palette-based image steganography. Pattern Recognition Lett., 2004, 25, 301–309.
  • Chan, C. K. and Cheng, L. M. Hiding data in images by simple LSB substitution. Pattern Recognition, 2004, 37, 469–474.
  • Wang, R. Z., Lin, C. F. and Lin, J. C. Hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition, 2001, 34, 671–683.
  • Chang, C. C., Hsiao, J. Y. and Chan, C. S. Finding optimal LSB substitution in image hiding by dynamic programming strategy. Pattern Recognition, 2003, 36, 1583–1595.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.