10
Views
4
CrossRef citations to date
0
Altmetric
Articles

A new data hiding strategy with restricted region protection

, &
Pages 235-249 | Published online: 18 Jul 2013

REFERENCES

  • National Institute of Standards and Technology. Data Encryption Standard (DES), 1977, Federal Information Processing Standards Publication 46 (National Institute of Standards and Technology, Gaithersburg, MD).
  • National Institute of Standards and Technology. ‘Announcing the Advanced Encryption Standard (AES)’, 2001, Federal Information Processing Standards Publication 197 (National Institute of Standards and Technology, Gaithersburg, MD).
  • Rivest, R. L., Shamir, A. and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 1978, 21, 120–126.
  • Anderson, R. R. and Peticolas, F. A. P. On the limits of steganography. IEEE J. Selected Areas Commun., 1988, 16, 474–481.
  • Artz, D. Digital steganographic: hiding data within data. IEEE Internet Comput., 2001, 5, 75–80.
  • Chang, C. C., Chen, K. N., Lee, C. F. and Wang, Z. H. Hiding information in region-based wet images, Proc. 2nd Int. Symp. on Electronic commerce and security: ISECS 2009, Nanchang, China, May 2009, IEEE, pp. 189–194.
  • Chang, C. C., Hsiao, J. Y. and Chan, C. S. Finding optimal LSB substitution in image hiding by dynamic programming strategy. Patt. Recogn., 2003, 36, 1583–1595.
  • Lee, C. F., Chang, C. C. and Wang, K. H. An improvement of EMD embedding method for large payloads by pixel segmentation strategy. J. Image Vision Comput., 2008, 26, 1670–1676.
  • Ni, Z., Shi, Y. Q., Ansari, N. and Su, W. Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol., 2006, 16, 354–361.
  • Thodi, D. M. and Rodriguez, J. J. Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process., 2007, 16, 721–730.
  • Tian, J. Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol., 2003, 13, 890–896.
  • Wu, D. C. and Tsai, W. H. A steganographic method for images by pixel-value differencing. Patt. Recogn. Lett., 2003, 24, 1613–1626.
  • Zhang, X. and Wang, S. Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett., 2006, 10, 781–783.
  • Chang, C. C. and Chou, Y. C. A fragile digital image authentication scheme inspired by wet paper codes. Fundam. Inform., 2009, 90, 17–26.
  • Chang, C. C., Tai, W. L. and Chen, K. N. Lossless data hiding based on histogram modification for image authentication, Proc. Int. Conf. on Embedded andubiquitous computing: EUC 2008, Shanghai, China, December 2008, Shanghai Jiao Tong University, Vol. 1, pp. 506–511.
  • Fridrich, J., Goljan, M., Lisonek, P. and Soukal, D. Writing on wet paper. IEEE Trans. Signal Process., 2005, 53, 3923–3935.
  • Huffman, D. A. A method for the construction of minimum redundancy codes. Resonance, 2006, 11, 91–99.
  • Cormen, T. H., Leiserson, C. E., Rivest, R. L. and Stein, C. Introduction to Algorithms, 2001, 2nd edition (MIT Press, Cambridge, MA).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.