참고문헌
- Ker, A., Steganalysis of LSB Matching in Grayscale Images, IEEE Signal Processing Letters 12, pp. 441-444, 2005. https://doi.org/10.1109/LSP.2005.847889
- Mielikainen, J., LSB Matching Revisited, IEEE Signal Processing Letters 13, pp. 285-287, 2006. https://doi.org/10.1109/LSP.2006.870357
- Wu, D. C., Tsai, W. H., A Steganographic Method for Images by Pixel-value Differencing, Pattern Reccognition Letters 24, pp. 1613-1626, 2003. https://doi.org/10.1016/S0167-8655(02)00402-6
- Yang, C. H., Weng, C. Y., A Steganographic Method for Digital Images by Multi-pixel Differencing, International Computer Symposium, IEEE, pp. 831-836, 2006.
- Chang, K. C., Huang, P. S., Tu, T. M., Chang, C. P., Adaptive Image Steganographic Scheme Based on Tri-way Pixel-value Dierencing, Systems, Man and Cybernetics, IEEE, pp. 1165-1170, 2007.
- Johnson, N. F., Exploring Steganography - Seeing the Unseen, Computer Practices, pp. 26-34, 1998.
- Swanson, M. Kobayashi, M. Tewk. A., Multimedia Data Embedding and Water-marking Technologies, Proceeding of IEEE 86, pp. 1064-1087, 1998. https://doi.org/10.1109/5.687830
- Fridrich, J., Goljan, M., Du, R., Invertible Authentication, Proceedings of SPIE, Security and Watemarking of Multimedia Contents, pp. 197-208, 2001.
- Macq, B., Deweyand F., Trusted Headers for Medical Images, DFG VIII-D II Watermarking Workshop, Erlangen, Germany, 1999.
- Chan, C. K., Cheng, L. M., Hiding Data in Images by Simple LSB Substitution, Pattern Recognition 37, pp. 469-474, 2004. https://doi.org/10.1016/j.patcog.2003.08.007
- Chang, C. C., Lin, M. H., Hu, Y. C., A Fast and Secure Image Hiding Scheme Based on LSB Substitution, International Journal of Pattern Recognition 16, pp. 399-416, 2002. https://doi.org/10.1142/S0218001402001770
- Wang, R. Z., Lin, C. F., Lin, J. C., Image Hiding by Optimal LSB Substitution and Genetic Algorithm, Pattern Recognition 34, pp. 671-683, 2001. https://doi.org/10.1016/S0031-3203(00)00015-7
- Thien, C. C., Lin, J. C., A Simple and High-hiding Capacity Method for Hiding Digit-by-digit Data in Images Based on Modulus Function, Pattern Recognition 36, pp. 2876-2881, 2003.
- Jung, K. H., Yoo, K. Y., Data Hiding Method using Image Interpolation, Computer Standards and Interfaces 31, pp. 465-470, 2009. https://doi.org/10.1016/j.csi.2008.06.001
- Lin, I. C., Lin Y. B., Wang, C. M., Hiding Data in Spatial Domain Images with Distortion Tolerance, Computer Standards and Interfaces 31, pp. 458-464, 2009. https://doi.org/10.1016/j.csi.2008.05.010
- Lin, C. C., Chen, S. C., Hsueh, N. L., Adaptive Embedding Techniques for VQ-compressed Images, Information Sciences 179, pp. 140-149, 2009. https://doi.org/10.1016/j.ins.2008.09.001
- Lee, C. F., Chang, C. C., Wang, K. H., An Improvement of EMD Embedding Method for Large Payloads by Pixel Segmentation Strategy, Image and Vision Computing 26, pp. 1670-1676, 2008. https://doi.org/10.1016/j.imavis.2008.05.005
- Goljan, M., Fridrich, J., Holotyak. T., New Blind Steganalysis and Its Implications, Proceedings of SPIE Electronic Imaging, pp. 1-13, 2006.
- Cheddad, A., Condell, J., Curran, K., Kevitt. P. M., Digital Image Steganography : Survey and Analysis of Current Methods, Signal Processing 90, pp. 727-752, 2010. https://doi.org/10.1016/j.sigpro.2009.08.010
- Wu, H. C., Wang, H. C. Tsai, C. S., Wang, C. M., Reversible Image Steganographic Scheme Via Predictive Coding, Displays 31, pp. 35-43, 2010. https://doi.org/10.1016/j.displa.2009.10.002
- Sabeti, V., Samvi, S., Mahdavi, M., Shirani, S., Steganalysis and Payload Estimation of Embedding in Pixel Differences using Neural Networks, Pattern Recognition 43, pp. 405-415, 2010. https://doi.org/10.1016/j.patcog.2009.06.006