Asian Journal of Information Technology
334 - 341
Providing a Better Protection During Exchange of Critical Data Based on Information
Amin, M.M., M. Salleh, S. Ibrahim, M.R. Katmin and M.Z.I. Shamsuddin, 2003. Information hiding using steganography. Proceedings of the 4th National Conference on Telecommunication Technology, January 14-15, 2003, Shah Alam, Malaysia, pp: 21-25.
Anderson, R.J. and F.A. Petitcolas, 1998. On the limits of steganography. IEEE J. Selected Areas Commun., 16: 474-481.CrossRef | Direct Link |
Chang, C.C., C.C. Lin, C.S. Tseng and W.L. Tai, 2007. Reversible hiding in DCT-based compressed images. Inform. Sci., 177: 2768-2786.CrossRef | Direct Link |
Chang, C.C., T.D. Kieu and Y.C. Chou, 2008. Reversible information hiding for VQ indices based on locally adaptive coding. J. Visual Commun. Image Representation, 20: 57-64.CrossRef | Direct Link |
Channalli, S. and A. Jadhav, 2009. Steganography an art of hiding data. Int. J. Comput. Sci. Eng., 3: 137-141.Direct Link |
Chen, T.S., C.C. Chang and M.S. Hwang, 1998. A virtual image cryptosystem based upon vector quantization. IEEE Trans. Image Process., 7: 1485-1488.CrossRef | Direct Link |
Fard, A.M., M.R. Akbarzadeh-T and F. Varasteh-A, 2006. A new genetic algorithm approach for secure JPEG steganography. Proceedings of IEEE International Conference on Engineering of Intelligent Systems, April 22-23, 2006, Islamabad, Pakistan, pp: 1-6.
Francia, G.A. and T.S. Gomez, 2006. Steganography obliterator: An attack on the least significant bits. Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, September 22-23, 2006, Georgia, USA., pp: 85-91.
Franz, E., S. Ronisch and R. Bartel, 2009. Improved embedding based on a set of cover images. Proceedings of the 11th ACM Workshop on Multimedia and Security, September 7-8, 2009, Princeton, NJ, USA., pp: 141-150.
Fridrich, J., M. Goljan and R. Du, 2002. Lossless data embedding-new paradigm in digital watermarking. EURASIP J. Applied Signal Process., 2002: 185-196.CrossRef | Direct Link |
Hashad, A.I., A.S. Madani and A.E.M.A. Wahdan, 2005. A robust steganography technique using discrete cosine transform insertion. Proceedings of ITI 3rd International Conference on Information and Communications Technology Enabling Technologies for the New Knowledge Society, December 5-6, 2005, Cairo, Egypt, pp: 255-264.
Johnson, N.F. and S. Jajodia, 1998. Exploring steganography: Seeing the unseen. Computer, 31: 26-34.CrossRef |
Lou, D.C., M.C. Hu and J.L. Liu, 2008. Multiple layer data hiding scheme for medical images. Comput. Standards Interfaces, 31: 329-335.CrossRef | Direct Link |
Provos, N. and P. Honeyman, 2003. Hide and seek: An introduction to steganography. IEEE Secur. Privacy, 1: 32-44.CrossRef |
Raja, K.B., C.R. Chowdary, K.R. Venugopal and L.M. Patnaik, 2005. A secure image steganography using LSB, DCT and compression techniques on raw images. Proceedings of 3rd International Conference on Intelligent Sensing and Information Processing, December 14-17, 2005, Bangalore, India, pp: 170-176.
Sallee, P., 2003. Model-based steganography. Proceedings of the 2nd International Workshop on Digital Watermarking, October 20-22, 2003, Seoul, Korea, pp: 254-260.
Tian, J., 2002. Wavelet-based reversible watermarking for authentication. Proceedings of the Security and Watermarking of Multimedia Contents IV, January 19, 2002, San Jose, CA., USA., pp: 679-690.
Tseng, H.W. and C.C. Chang, 2004. Steganography using JPEG-compressed images. Proceedings of the 4th International conference on Computer and Information Technology, September 14-16, 2004, Wuhan, China, pp: 12-17.
Walton, S., 1995. Image authentication for a slippery new age. Dr Dobb's J. Software Tools Prof. Programmer, 20: 18-27.
Wayner, P., 2002. Disappearing Cryptography: Information Hiding: Steganography and Watermarking. 2nd Edn., Morgan Kaufmann Publishers, San Francisco, CA, USA.