REFERENCES
- Amin PK, Liu N, Subbalakshmi KP. Statistical attack resilient data hiding. Int. J. Network Secur., 2007, 5, 112–120.
- Barton JM. ‘Method and apparatus for embedding authentication information within digital data’, US Patent 5 646997, 1997.
- Chan CK, Cheng LM. Hiding data in images by simple LSB substitution. Pattern Recognit., 2004, 37, 469–474.
- Chang CC, Kieu D, Chou YC. Reversible information hiding for VQ indices based on locally adaptive coding. J. Vis. Commun. Image Represent., 2009, 20, 57–64.
- Chang CC, Tai WL, Lin CC. A reversible data hiding scheme based on side match vector quantization. IEEE Trans. Circuits Syst. Video Technol., 2006, 16, 1301–1308.
- Chang CC, Wu WC. A steganographic method for hiding secret data using side match vector quantization. IEICE Trans. Inf. Syst., 2005, E88-D, 2159–2167.
- Chen TS, Chang CC, Hwang MS. A virtual image cryptosystem based upon vector quantization. IEEE Trans. Image Process., 1998, 7, 1485–1488.
- Chiou SF, Liao IE, Hwang MS. A capacity-enhanced reversible data hiding scheme based on SMVQ. Imag. Sci. J., 2011, 59, 17–24.
- Feng JB, Lin IC, Tsai CS, Chu YP. Reversible watermarking: current status and key issues. Int. J. Network Secur., 2006, 2, 161–170.
- Gray RM. Vector quantization. IEEE ASSP Mag., 1984, 4–29.
- Hsiao JY, Chen JF, Chang JM. An adaptive reversible information hiding method based on search-order coding for VQ-compressed images. Imag. Sci. J., 2009, 57, 37–45.
- Hwang MS, Chang CC, Hwang KF. Digital watermarking of images using neural networks. J. Electron. Imag., 2000, 9, 548–555.
- Kim T. Side match and overlap match vector quantizers for images. IEEE Trans. Image Process., 1992, 1, 170–185.
- Lee CF, Chen KN, Chang CC. A new data hiding strategy with restricted region protection. Imag. Sci. J., 2009, 57, 235–249.
- Liao Z, Huang Y, Li C. Research on data hiding capacity. Int. J. Network Secur., 2007, 5, 140–144.
- Linde Y, Buzo A, Gray RM. An algorithm for vector quantizer design. IEEE Trans. Commun., 1980, 28, 84–95.
- Liu Y, Sun X, Cox IJ, Wang H. Natural language information hiding based on Chinese mathematical expression. Int. J. Network Secur., 2009, 8, 10–15.
- Pennebaker WB, Mitchell JL. The JPEG Still Image Data Compression Standard, 1993 (Kluwer Academic Publishers, New York).
- Taubman DS, Marcellin MW. JPEG2000: Image Compression Fundamentals Standards and Practice, 2002 (Kluwer Academic Publishers, Boston, MA).
- Wang CM, Wu N, Tsai CS, Hwang MS. A high quality stegano-graphic method with pixel-value differencing and modulus function. J. Syst. Softw., 2008, 81, 150–158.
- Wu HC, Wu NI, Tsai CS, Hwang MS. Image steganographic scheme based on pixel-value differencing and lsb replacement methods. IEE Proc. Vis. Image Signal Process., 2005, 152, 611–615.
- Wu NI, Hwang MS. Data hiding: current status and key issues. Int. J. Network Secur., 2007, 4, 1–9.
- Wu NI, Wang CM, Tsai CS, Hwang MS. A certificate-based water-marking scheme for coloured images. Image Sci. J., 2008, 56, 326–332.
- Xinag S, Huang J. Analysis of quantization-based audio watermarking to D/A and A/D conversions. Int. J. Network Secur., 2006, 3, 230–238.
- Xuan G, Zhu J, Chen J, Shi YQ, Ni Z, Su W. Distortionless data hiding based on integer wavelet transform. Electron. Lett., 2002, 38, 1646–1648.