[1]Diffie W, Hellman M E. New directions in cryptography [J].
IEEE Transactions on Information Theary, 1976,22(16):644654.
[2]Edward R, Morris D. National institute of standards and technology, request for candidate algorithm nomination for the advanced encryption Standard [P]. US: RIN 0693ZA16.19970912
[3]Barton J M. Method and apparatus for embedding authentication information within digital data [P]. US: 5646997 19970708
[4]Chang C C, Lin C Y. Reversible steganographic method using SMVQ approach based on declustering [J].
Information Sciences, 2007, 177(8):17961805
[5]Chang C C, Lin C C, Tseng C S, et al. Reversible hiding in dctbased compressed image [J].
Information Sciences, 2007, 177(8):27682786
[6]Chen J Y, Cheng C C, Kuo W C, et al. Reversible data hiding scheme based on vector quantization [C]//International Conference on Safety & Security Management and Engineering Technology 2007
Chiayi:Wufeng University, 2007:711715
[7]Lee C F, Wang Y R, Chang C C, et al. A steganographic method with high embedding capacity by improving exploiting modification direction [C]//
Third International Conference. Kaohsiung: National Kaohsiung University of Applied Sciences, 2007: 497500
[8]Ni Z, Shi Y Q, Ansari N, et al. Reversible data hiding [C]//
IEEE International Symposium on Circuits and Systems. TH: IEEE, 2003: 912915
[9]Ni Z, Shi Y Q, Ansari N, et al. Reversible data hiding [J].
IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16(3): 354362
[10]ISO/IEC 109181, Information technologydigital compression and coding of continuoustone still images: Requirements and guidelines [S].
[11]ISO/IEC 154441, JPEG 2000 image coding system. Part 1. Core coding system [S].
[12]Seki Y, Kobauashi H, Fujiyoshi M, et al. A data hiding method without specifying embedded positions for jpeg image [J]. Electronics and Communications in Japan, Part3, 2007, 90(11): 2129
[13]Chen J Y, Cheng J C, Kuo W C, et al. Reversible data hiding scheme based on dct [C]//
Conference on Information Technology and Applications in Outlying Islands.
Penghu:National Penghu University of Science and Technology, 2008: 200204
[14]Kuo W C, Wuu L C, Shyi C N, et al. A data hiding scheme with high embedding capacity based on general improving exploiting modification direction method [C]//
Ninth International Conference on Hybrid Intelligent Systems. Shenyang: Shenyang Normal University, 2009: 6972
[15]Zhang X, Wang S. Efficient steganographic embedding by exploiting modification direction [J].
IEEE Communications Letters, 2006, 10(11): 13 |