23.3.9.4 Surveys, Image Hiding, Data Hiding, Steganography

Chapter Contents (Back)
Survey, Steganography. Survey, Watermark. Watermark. Watermark, Survey.

Johnson, N.F.[Neil F.], Jajodia, S.[Sushil],
Exploring Steganography: Seeing the Unseen,
Computer(31), No. 2, February 1998, pp. 26-34. Survey, Steganography. Discussion of various available tools for hiding text (and other information) in images. BibRef 9802

Brown, A.,
S-Tools for Windows,
Online Book1998.
WWW Link. Steganography tools to download BibRef 9800

Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.,
Information hiding: A survey,
PIEEE(87), No. 7, July 1999, pp. 1062-1078.
IEEE DOI 9907
Survey, Steganography. BibRef

Pérez-González, F.[Fernando], Hernández, J.R.[Juan R.], Balado, F.[Félix],
Approaching the Capacity Limit in Image Watermarking: A Perspective on Coding Techniques for Data Hiding Applications,
SP(81), No. 6, June 2001, pp. 1215-1238.
Elsevier DOI 0106
BibRef

Barni, M.[Mauro], Bartolini, F.[Franco], Fridrich, J.[Jessica],
Special Issue: Emerging Applications of Multimedia Data Hiding,
JASP(2002), No. 2, 2002, pp. 123-125. 0202
BibRef

Moulin, P., Mihcak, M.K.,
A framework for evaluating the data-hiding capacity of image sources,
IP(11), No. 9, September 2002, pp. 1029-1042.
IEEE DOI 0210
Evaluation, Watermark. BibRef

Mihcak, M.K., Moulin, P.,
Information embedding codes matched to locally stationary gaussian image models,
ICIP02(II: 137-140).
IEEE DOI 0210
BibRef

Moulin, P., Mihcak, M.K., Lin, G.I.,
An Information-theoretic Model for Image Watermarking and Data Hiding,
ICIP00(Vol III: 667-670).
IEEE DOI 0008
BibRef

Martin, A., Sapiro, G., Seroussi, G.,
Is Image Steganography Natural?,
IP(14), No. 12, December 2005, pp. 2040-2050.
IEEE DOI 0512
BibRef

Alturki, F.T.[Faisal T.], Almutairi, A.F.[Ali F.], Mersereauu, R.M.[Russell M.],
Analysis of blind data hiding using discrete cosine transform phase modulation,
SP:IC(22), No. 4, April 2007, pp. 347-362.
Elsevier DOI 0704
Data hiding; Blind digital watermarking; Data embedding capacity; Bit error rate BibRef

Ker, A.D.,
A Capacity Result for Batch Steganography,
SPLetters(14), No. 8, August 2007, pp. 525-528.
IEEE DOI 0709
BibRef

Paulson, L.D.[Linda Dailey],
Steganography Development Offers Promise,
Computer(43), No. 6, June 2010, pp. 18-21.
IEEE DOI 1007
BibRef

Böhme, R.[Rainer],
Advanced Statistical Steganalysis,
Springer2010, ISBN: 978-3-642-14312-0
WWW Link. Buy this book: Advanced Statistical Steganalysis (Information Security and Cryptography) 1010
BibRef

Cimato, S.[Stelvio], Yang, C.N.[Ching-Nung], (Eds.)
Visual Cryptography and Secret Image Sharing,
CRC PressJuly 15, 2011 ISBN: 9781439837214
WWW Link. Buy this book: Visual Cryptography and Secret Image Sharing (Digital Imaging and Computer Vision) 1106
BibRef

Wu, X.T.[Xiao-Tian], Yang, C.N.[Ching-Nung],
A combination of color-black-and-white visual cryptography and polynomial based secret image sharing,
JVCIR(61), 2019, pp. 74-84.
Elsevier DOI 1906
Visual cryptography, Secret image sharing, Color, Embedding, Polynomial, Black and white BibRef

Iwamura, K.[Keiichi], Kawamura, M.[Masaki], Kuribayashi, M.[Minoru], Iwata, M.[Motoi], Kang, H.[Hyunho], Gohshi, S.[Seiichi], Nishimura, A.[Akira],
Information Hiding and Its Criteria for Evaluation,
IEICE(E100-D), No. 1, January 2017, pp. 2-12.
WWW Link. 1701
BibRef

Satchidanandan, B., Kumar, P.R.,
Dynamic Watermarking: Active Defense of Networked Cyber-Physical Systems,
PIEEE(105), No. 2, February 2017, pp. 219-240.
IEEE DOI 1702
actuators BibRef

Tang, W., Tan, S., Li, B., Huang, J.,
Automatic Steganographic Distortion Learning Using a Generative Adversarial Network,
SPLetters(24), No. 10, October 2017, pp. 1547-1551.
IEEE DOI 1710
steganography, automatic steganographic distortion learning, BibRef

Girdhar, A.[Ashish], Kumar, V.[Vijay],
Comprehensive survey of 3D image steganography techniques,
IET-IPR(12), No. 1, January 2018, pp. 1-10.
DOI Link 1712
BibRef
And: Erratum: IET-IPR(12), No. 4, April 2018, pp. 619-619.
DOI Link 1804
BibRef

Kim, C., Chang, C.C., Yang, C.N., Zhang, X., Baek, J.,
Special Issue: Real-Time Data Hiding and Visual Cryptography,
RealTimeIP(14), No. 1, January 2018, pp. 1-4.
WWW Link. 1802
BibRef

Hussain, M.[Mehdi], Wahab, A.W.A.[Ainuddin Wahid Abdul], Idris, Y.I.B.[Yamani Idna Bin], Ho, A.T.S.[Anthony T.S.], Jung, K.H.[Ki-Hyun],
Image steganography in spatial domain: A survey,
SP:IC(65), 2018, pp. 46-66.
Elsevier DOI 1805
Image steganography, Spatial domain steganography, Adaptive steganography, Data hiding, Security, Digital spatial domain BibRef

Tao, J.Y.[Jin-Yuan], Li, S.[Sheng], Zhang, X.P.[Xin-Peng], Wang, Z.C.[Zi-Chi],
Towards Robust Image Steganography,
CirSysVideo(29), No. 2, February 2019, pp. 594-600.
IEEE DOI 1902
Transform coding, Image coding, Discrete cosine transforms, Communication channels, Data mining, Distortion, Q-factor, JPEG compression BibRef


Li, Z., Beugnon, S., Puech, W., Bors, A.G.,
Rethinking the high capacity 3D steganography:\ Increasing its resistance to steganalysis,
ICIP17(510-414)
IEEE DOI 1803
Data mining, Distortion, Face, Image edge detection, Mathematical model, Resistance, steganalysis BibRef

Cerkez, P.S.,
Do you see what I see?,
AIPR13(1-7)
IEEE DOI 1408
Steganography. BibRef

Fridrich, J.[Jessica],
Modern Trends in Steganography and Steganalysis,
IWDW11(1).
Springer DOI 1208
Keynote, overview talk. BibRef

Rajput, G.K., Agrawal, R.K.,
Evaluation of Feature Selection Measures for Steganalysis,
PReMI09(432-439).
Springer DOI 0912
BibRef

Dominguez-Conde, G.[Gabriel], Comesana, P.[Pedro], Perez-Gonzalez, F.[Fernando],
Perfomance analysis of the Fridrich-Goljan self-embedding authentication method,
ICIP09(1253-1256).
IEEE DOI 0911
BibRef

Ker, A.D.[Andrew D.],
Estimating the Information Theoretic Optimal Stego Noise,
DW09(184-198).
Springer DOI 0908
BibRef

Cox, I.J.[Ingemar J.],
Data Hiding and the Statistics of Images,
DW09(1).
Springer DOI 0908
Overview paper. BibRef

Huang, F.J.[Fang-Jun], Shi, Y.Q.[Yun Q.], Huang, J.W.[Ji-Wu],
A study on security performance of YASS,
ICIP08(2084-2087).
IEEE DOI 0810
Yet another steganograpic system. BibRef

Rocha, A.[Anderson], Goldenstein, S.K.[Siome K.], Scheirer, W.J.[Walter J.], Boult, T.E.[Terrance E.],
The Unseen Challenge data sets,
WVU08(1-8).
IEEE DOI 0806
Dataset, Steganalysis. BibRef

Lee, S.K.[Sang-Kwang], Lim, S.J.[Seong-Jae], Suh, Y.H.[Young-Ho], Ho, Y.S.[Yo-Sung],
Lossless Data Hiding for Medical Images with Patient Information,
ICIP07(III: 253-256).
IEEE DOI 0709
BibRef

Westfeld, A.[Andreas],
Steganalysis in the Presence of Weak Cryptography and Encoding,
DW06(19-34).
Springer DOI 0611
BibRef

Lee, K.S.[Kwang-Soo], Westfeld, A.[Andreas], Lee, S.J.[Sang-Jin],
Category Attack for LSB Steganalysis of JPEG Images,
DW06(35-48).
Springer DOI 0611
BibRef

Ullerich, C.[Christian], Westfeld, A.[Andreas],
Weaknesses of MB2,
DW07(127-142).
Springer DOI 0712
BibRef

Chang, K.[Kisik], Deng, R.H.[Robert H.], Feng, B.[Bao], Lee, S.J.[Sang-Jin], Kim, H.J.[Hyung-Jun],
On Security Notions of Steganographic Systems,
DW04(137-151).
Springer DOI 0505
BibRef

Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Watermarks for Copyright, Ownership Protection, Authentication, Verification .


Last update:Jun 13, 2019 at 09:53:00