25.3.9.8 Surveys, Image Hiding, Data Hiding, Steganography

Chapter Contents (Back)
Survey, Steganography. Survey, Watermark. Watermark. Watermark, Survey.

Johnson, N.F.[Neil F.], Jajodia, S.[Sushil],
Exploring Steganography: Seeing the Unseen,
Computer(31), No. 2, February 1998, pp. 26-34. Survey, Steganography. Discussion of various available tools for hiding text (and other information) in images. BibRef 9802

Brown, A.,
S-Tools for Windows,
Online Book1998.
WWW Link. Steganography tools to download BibRef 9800

Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.,
Information hiding: A survey,
PIEEE(87), No. 7, July 1999, pp. 1062-1078.
IEEE DOI 9907
Survey, Steganography. BibRef

Pérez-González, F.[Fernando], Hernández, J.R.[Juan R.], Balado, F.[Félix],
Approaching the Capacity Limit in Image Watermarking: A Perspective on Coding Techniques for Data Hiding Applications,
SP(81), No. 6, June 2001, pp. 1215-1238.
Elsevier DOI 0106
BibRef

Barni, M.[Mauro], Bartolini, F.[Franco], Fridrich, J.[Jessica],
Special Issue: Emerging Applications of Multimedia Data Hiding,
JASP(2002), No. 2, 2002, pp. 123-125. 0202
BibRef

Moulin, P., Mihcak, M.K.,
A framework for evaluating the data-hiding capacity of image sources,
IP(11), No. 9, September 2002, pp. 1029-1042.
IEEE DOI 0210
Evaluation, Watermark. BibRef

Mihcak, M.K., Moulin, P.,
Information embedding codes matched to locally stationary gaussian image models,
ICIP02(II: 137-140).
IEEE DOI 0210
BibRef

Moulin, P., Mihcak, M.K., Lin, G.I.,
An Information-theoretic Model for Image Watermarking and Data Hiding,
ICIP00(Vol III: 667-670).
IEEE DOI 0008
BibRef

Voloshynovskiy, S.[Sviatoslav], Deguillaume, F.[Frederic], Koval, O.[Oleksiy], Pun, T.[Thierry],
Information-theoretic Data-hiding: Recent Achievements And Open Problems,
IJIG(5), No. 1, January 2005, pp. 5-35. 0501
BibRef

Martin, A., Sapiro, G., Seroussi, G.,
Is Image Steganography Natural?,
IP(14), No. 12, December 2005, pp. 2040-2050.
IEEE DOI 0512
BibRef

Alturki, F.T.[Faisal T.], Almutairi, A.F.[Ali F.], Mersereauu, R.M.[Russell M.],
Analysis of blind data hiding using discrete cosine transform phase modulation,
SP:IC(22), No. 4, April 2007, pp. 347-362.
Elsevier DOI 0704
Data hiding; Blind digital watermarking; Data embedding capacity; Bit error rate BibRef

Ker, A.D.,
A Capacity Result for Batch Steganography,
SPLetters(14), No. 8, August 2007, pp. 525-528.
IEEE DOI 0709
BibRef

Paulson, L.D.[Linda Dailey],
Steganography Development Offers Promise,
Computer(43), No. 6, June 2010, pp. 18-21.
IEEE DOI 1007
BibRef

Böhme, R.[Rainer],
Advanced Statistical Steganalysis,
Springer2010, ISBN: 978-3-642-14312-0
WWW Link. Buy this book: Advanced Statistical Steganalysis (Information Security and Cryptography) 1010
BibRef

Cimato, S.[Stelvio], Yang, C.N.[Ching-Nung], (Eds.)
Visual Cryptography and Secret Image Sharing,
CRC PressJuly 15, 2011 ISBN: 9781439837214
WWW Link. Buy this book: Visual Cryptography and Secret Image Sharing (Digital Imaging and Computer Vision) 1106
BibRef

Zielinska, E.[Elzbieta], Mazurczyk, W.[Wojciech], Szczypiorski, K.[Krzysztof],
Trends in Steganography,
CACM(56), No. 3, March 2014, pp. 86-95.
DOI Link 1403
Survey, Steganography. Methods for embedding secret data are more sophisticated than their ancient predecessors, but the basic principles remain unchanged. BibRef

Tew, Y.[Yiqi], Wong, K.S.[Kok-Sheik],
An Overview of Information Hiding in H.264/AVC Compressed Video,
CirSysVideo(24), No. 2, February 2014, pp. 305-319.
IEEE DOI 1403
data compression BibRef

Wu, X.T.[Xiao-Tian], Yang, C.N.[Ching-Nung],
A combination of color-black-and-white visual cryptography and polynomial based secret image sharing,
JVCIR(61), 2019, pp. 74-84.
Elsevier DOI 1906
Visual cryptography, Secret image sharing, Color, Embedding, Polynomial, Black and white BibRef

Wu, X.T.[Xiao-Tian], Yang, C.N.[Ching-Nung],
Probabilistic color visual cryptography schemes for black and white secret images,
JVCIR(70), 2020, pp. 102793.
Elsevier DOI 2007
Visual cryptography, Probabilistic, Color, Black and white, Pixel expansion, Secret image sharing BibRef

Iwamura, K.[Keiichi], Kawamura, M.[Masaki], Kuribayashi, M.[Minoru], Iwata, M.[Motoi], Kang, H.[Hyunho], Gohshi, S.[Seiichi], Nishimura, A.[Akira],
Information Hiding and Its Criteria for Evaluation,
IEICE(E100-D), No. 1, January 2017, pp. 2-12.
WWW Link. 1701
BibRef

Satchidanandan, B., Kumar, P.R.,
Dynamic Watermarking: Active Defense of Networked Cyber-Physical Systems,
PIEEE(105), No. 2, February 2017, pp. 219-240.
IEEE DOI 1702
actuators BibRef

Girdhar, A.[Ashish], Kumar, V.[Vijay],
Comprehensive survey of 3D image steganography techniques,
IET-IPR(12), No. 1, January 2018, pp. 1-10.
DOI Link 1712
BibRef
And: Erratum: IET-IPR(12), No. 4, April 2018, pp. 619-619.
DOI Link 1804
BibRef

Kim, C., Chang, C.C., Yang, C.N., Zhang, X., Baek, J.,
Special Issue: Real-Time Data Hiding and Visual Cryptography,
RealTimeIP(14), No. 1, January 2018, pp. 1-4.
WWW Link. 1802
BibRef

Hussain, M.[Mehdi], Wahab, A.W.A.[Ainuddin Wahid Abdul], Idris, Y.I.B.[Yamani Idna Bin], Ho, A.T.S.[Anthony T.S.], Jung, K.H.[Ki-Hyun],
Image steganography in spatial domain: A survey,
SP:IC(65), 2018, pp. 46-66.
Elsevier DOI 1805
Image steganography, Spatial domain steganography, Adaptive steganography, Data hiding, Security, Digital spatial domain BibRef

Tao, J.Y.[Jin-Yuan], Li, S.[Sheng], Zhang, X.P.[Xin-Peng], Wang, Z.C.[Zi-Chi],
Towards Robust Image Steganography,
CirSysVideo(29), No. 2, February 2019, pp. 594-600.
IEEE DOI 1902
Transform coding, Image coding, Discrete cosine transforms, Communication channels, Data mining, Distortion, Q-factor, JPEG compression BibRef

Giboulot, Q., Fridrich, J.,
Payload Scaling for Adaptive Steganography: An Empirical Study,
SPLetters(26), No. 9, September 2019, pp. 1339-1343.
IEEE DOI 1909
game theory, image coding, steganography, secret payload, cover size, constant statistical detectability, steganographer, adaptive embedding BibRef

Chanu, O.B.[Oinam Bidyapati], Neelima, A.[Arambam],
A survey paper on secret image sharing schemes,
MultInfoRetr(8), No. 4, December 2019, pp. 195-215.
WWW Link. 1912
Survey, Steganography. BibRef

Wang, L.[Lina], Xu, Y.[Yibo], Zhai, L.M.[Li-Ming], Ren, Y.Z.[Yan-Zhen], Du, B.[Bo],
A posterior evaluation algorithm of steganalysis accuracy inspired by residual co-occurrence probability,
PR(87), 2019, pp. 106-117.
Elsevier DOI 1812
Steganography, Steganalysis, Carrier security, Adaptive convolution, Posterior accuracy BibRef

Ruan, F.[Feng], Zhang, X.[Xing], Zhu, D.W.[Da-Wei], Xu, Z.Y.[Zhan-Yang], Wan, S.H.[Shao-Hua], Qi, L.Y.[Lian-Yong],
Deep learning for real-time image steganalysis: a survey,
RealTimeIP(17), No. 1, February 2020, pp. 149-160.
Springer DOI 2002
Survey, Steganalysis. BibRef

Arivazhagan, S.[Selvaraj], Amrutha, E.[Ezhilarasan], Wellington, S.L.J.[Sylvia Lilly Jebarani], Sam, A.R.[Ananthi Roy],
Digital image steganalysis: A survey on paradigm shift from machine learning to deep learning based techniques,
IET-IPR(15), No. 2, 2021, pp. 504-522.
DOI Link 2106
BibRef

Puteaux, P.[Pauline], Ong, S.Y.[Sim-Ying], Wong, K.[Kok_Sheik], Puech, W.[William],
A survey of reversible data hiding in encrypted images: The first 12 years,
JVCIR(77), 2021, pp. 103085.
Elsevier DOI 2106
Survey, Reversible Data Hiding. Multimedia security, Image encryption, Data hiding, Signal processing in the encrypted domain BibRef

Arivazhagan, S.[Selvaraj], Amrutha, E.[Ezhilarasan], Wellington, S.L.J.[Sylvia Lilly Jebarani],
Universal steganalysis of spatial content-independent and content-adaptive steganographic algorithms using normalized feature derived from empirical mode decomposed components,
SP:IC(101), 2022, pp. 116567.
Elsevier DOI 2201
Universal steganalysis, Empirical mode decomposition, Majority voting, Least significant bit algorithms, Content-adaptive algorithms BibRef


Yang, Z.L.[Zhong-Liang], Wang, K.[Ke], Ma, S.[Sai], Huang, Y.F.[Yong-Feng], Kang, X.G.[Xian-Gui], Zhao, X.F.[Xian-Feng],
ISTEGO100K: Large-scale Image Steganalysis Dataset,
IWDW19(352-364).
Springer DOI 2003
Dataset, Setganalysis. BibRef

Ishizuka, H.[Hirokazu], Echizen, I.[Isao], Iwamura, K.[Keiichi], Sakurai, K.[Koichi],
Evaluation of a Zero-Watermarking-Type Steganography,
IWDW14(613-624).
Springer DOI 1602
BibRef

Cerkez, P.S.,
Do you see what I see?,
AIPR13(1-7)
IEEE DOI 1408
Steganography. BibRef

Fridrich, J.[Jessica],
Modern Trends in Steganography and Steganalysis,
IWDW11(1).
Springer DOI 1208
Keynote, overview talk. BibRef

Rajput, G.K., Agrawal, R.K.,
Evaluation of Feature Selection Measures for Steganalysis,
PReMI09(432-439).
Springer DOI 0912
BibRef

Dominguez-Conde, G.[Gabriel], Comesana, P.[Pedro], Perez-Gonzalez, F.[Fernando],
Perfomance analysis of the Fridrich-Goljan self-embedding authentication method,
ICIP09(1253-1256).
IEEE DOI 0911
BibRef

Ker, A.D.[Andrew D.],
Estimating the Information Theoretic Optimal Stego Noise,
DW09(184-198).
Springer DOI 0908
BibRef

Cox, I.J.[Ingemar J.],
Data Hiding and the Statistics of Images,
DW09(1).
Springer DOI 0908
Overview paper. BibRef

Huang, F.J.[Fang-Jun], Shi, Y.Q.[Yun Q.], Huang, J.W.[Ji-Wu],
A study on security performance of YASS,
ICIP08(2084-2087).
IEEE DOI 0810
Yet another steganograpic system. BibRef

Rocha, A.[Anderson], Goldenstein, S.K.[Siome K.], Scheirer, W.J.[Walter J.], Boult, T.E.[Terrance E.],
The Unseen Challenge data sets,
WVU08(1-8).
IEEE DOI 0806
Dataset, Steganalysis. BibRef

Lee, S.K.[Sang-Kwang], Lim, S.J.[Seong-Jae], Suh, Y.H.[Young-Ho], Ho, Y.S.[Yo-Sung],
Lossless Data Hiding for Medical Images with Patient Information,
ICIP07(III: 253-256).
IEEE DOI 0709
BibRef

Westfeld, A.[Andreas],
Steganalysis in the Presence of Weak Cryptography and Encoding,
DW06(19-34).
Springer DOI 0611
BibRef

Lee, K.S.[Kwang-Soo], Westfeld, A.[Andreas], Lee, S.J.[Sang-Jin],
Category Attack for LSB Steganalysis of JPEG Images,
DW06(35-48).
Springer DOI 0611
BibRef

Ullerich, C.[Christian], Westfeld, A.[Andreas],
Weaknesses of MB2,
DW07(127-142).
Springer DOI 0712
BibRef

Chang, K.[Kisik], Deng, R.H.[Robert H.], Feng, B.[Bao], Lee, S.J.[Sang-Jin], Kim, H.J.[Hyung-Jun],
On Security Notions of Steganographic Systems,
DW04(137-151).
Springer DOI 0505
BibRef

Abdulaziz, N., Pang, K.,
Performance Evaluation of Data Hiding System Using Wavelet Transform and Error-control Coding,
ICIP00(Vol I: 605-608).
IEEE DOI 0008
BibRef

Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Steganalysis for Text, Documents .


Last update:Mar 16, 2024 at 20:36:19