5
Views
1
CrossRef citations to date
0
Altmetric
Articles

A BST-based robust image hiding method

Pages 351-359 | Published online: 18 Jul 2013

REFERENCES

  • ‘Information technology-JPEG 2000 image coding system’, 23ISO/IEC FCD 155444–1, ISO, Geneva, Switzerland, 2000.
  • ‘Information technology – lossless and near-lossless compression of continuous-tone still images’, 24ISO/IEC 14495–1, TU RecommendationT.87, ISO, Geneva, Switzerland, 1999.
  • Chang, C. C., Hsieh, C. P. and Hsiao, J. Y. A new approach to lossless image compression, Proc. Int. Conf. on Communication Technology (ICCT2003), Beijing, China, April 2003, Tianhong Plaza Hotel, pp. 1734–1738.
  • Chang, C. C., Chen, T. S. and Chung, L. Z. A steganographic method based upon JPEG and quantization table modification. Inform. Sci., 2002, 141, 123–138.
  • Thien, C. C. and Lin, J. C. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Patt. Recogn., 2003, 36, 2875–2881.
  • Chan, C. K. and Cheng, L. M. Hiding data in image by simple LSB substitution. Patt. Recogn., 2004, 37, 469–474.
  • Hartung, F. and Kutter, M. Multimedia watermarking techniques. Proc. IEEE, 1999, 87, 1079–1107.
  • Wang, H. J. and Huo, C. C. J. A multi-threshold wavelet coder (MTWC) for high fidelity image compression. IEEE Proc. Int. Conf. Image Process., 1997, 1, 652–655.
  • Zhong, J. M., Leung, C. H. and Tang, Y. Y. Wavelet image coding based on significance extraction using morphological operation. IEE Proc. Image Signal Process., 1999, 146, 206–210.
  • Wang, J. and Ji, L. a region and data hiding based error concealment scheme for images. IEEE Transform. Consumer Electron., 2001, 47, 257–262.
  • Grochenig, K. and Madych, W. R. Multiresolution analysis, Haar Bases, and self-similar tilings of Rn. IEEE Trans. Inform. Theory, 1992, 38, 556–568.
  • Johnson, N. F. and Jajodia, S. Steganography: seeing the unseen. IEEE Comput., 1998, 31, 26–34.
  • Wang, R. Z., Lin, C. F. and Lin, J. C. Image hiding by optimal LSB substitution and genetic algorithm. Patt. Recogn., 2001, 34, 671–683.
  • Hamming, R. W. Error detecting and error correcting codes. Bell Syst. Tech. J., 1950, 29, 147–160.
  • Chuang, T. J. and Lin, J. C. New approach to image encryption. J. Electron. Imag., 1998, 7, 350–356.
  • Kim, T. Side match and overlap match vector quantizers for images. IEEE Trans. Image Process., 1992, 1, 170–185.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.