References
- Chu, Y. H. and Chang, S. Dynamical cryptography based on synchronized chaotic systems. Electron. Lett., 1999, 35, 974–975.
- Highland, H. J. Data encryption: a non-mathematical approach. Computer Security, 1997, 16, 369–386.
- Bender, D. W., Gruhl, N. M. and Lu, A. Techniques for data hiding. IBM Syst. J., 1996, 35, 313–336.
- Chun, W. D. and Hsiang, T. E. Data hiding in images via multiple-based number conversion and lossy compression. IEEE Trans. Consumer Electron., 1998, 44, 1406–1412.
- Chen, L. H. and Lin, J. J. Mean quantization based image watermarking. Image Vision Comput., 2003, 21, 717–727.
- Chang, C. C. and Chan, C. S. A watermarking scheme based on principal component analysis technique. Informatica, 2003, 14, 431–444.
- Lin, S. D. and Chen, C. F. A robust DCT-based watermarking for copyright protection. IEEE Trans. Consumer Electron., 2000, 46, 415–421.
- Maniccam, S. S. and Bourbakis, N. Lossless compression and information hiding in images. Pattern Recognition, 2004, 37, 475–486.
- Spaulding, J., Noda, H., Shirazi, M. and Kawaguchi, E. BPCS steganography using EZW lossy compressed images. Pattern Recognition Lett., 2002, 23, 1579–1587.
- Wu, M. Y., Ho, Y. K. and Lee, J. H. An iterative method of palette-based image steganography. Pattern Recognition Lett., 2004, 25, 301–309.
- Chan, C. K. and Cheng, L. M. Hiding data in images by simple LSB substitution. Pattern Recognition, 2004, 37, 469–474.
- Wang, R. Z., Lin, C. F. and Lin, J. C. Hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition, 2001, 34, 671–683.
- Chang, C. C., Hsiao, J. Y. and Chan, C. S. Finding optimal LSB substitution in image hiding by dynamic programming strategy. Pattern Recognition, 2003, 36, 1583–1595.