[1]Diffie W, Hellman M E. New directions in cryptography [J].IEEE Transactions on Information Theary, 1976,22(16):644654.[2]Edward R, Morris D. National institute of standards and technology, request for candidate algorithm nomination for the advanced encryption Standard [P]. US: RIN 0693ZA16.19970912[3]Barton J M. Method and apparatus for embedding authentication information within digital data [P]. US: 5646997 19970708[4]Chang C C, Lin C Y. Reversible steganographic method using SMVQ approach based on declustering [J]. Information Sciences, 2007, 177(8):17961805[5]Chang C C, Lin C C, Tseng C S, et al. Reversible hiding in dctbased compressed image [J]. Information Sciences, 2007, 177(8):27682786[6]Chen J Y, Cheng C C, Kuo W C, et al. Reversible data hiding scheme based on vector quantization [C]//International Conference on Safety & Security Management and Engineering Technology 2007 Chiayi:Wufeng University, 2007:711715[7]Lee C F, Wang Y R, Chang C C, et al. A steganographic method with high embedding capacity by improving exploiting modification direction [C]//Third International Conference. Kaohsiung: National Kaohsiung University of Applied Sciences, 2007: 497500[8]Ni Z, Shi Y Q, Ansari N, et al. Reversible data hiding [C]//IEEE International Symposium on Circuits and Systems. TH: IEEE, 2003: 912915[9]Ni Z, Shi Y Q, Ansari N, et al. Reversible data hiding [J].IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16(3): 354362[10]ISO/IEC 109181, Information technologydigital compression and coding of continuoustone still images: Requirements and guidelines [S].[11]ISO/IEC 154441, JPEG 2000 image coding system. Part 1. Core coding system [S].[12]Seki Y, Kobauashi H, Fujiyoshi M, et al. A data hiding method without specifying embedded positions for jpeg image [J]. Electronics and Communications in Japan, Part3, 2007, 90(11): 2129[13]Chen J Y, Cheng J C, Kuo W C, et al. Reversible data hiding scheme based on dct [C]// Conference on Information Technology and Applications in Outlying Islands. Penghu:National Penghu University of Science and Technology, 2008: 200204[14]Kuo W C, Wuu L C, Shyi C N, et al. A data hiding scheme with high embedding capacity based on general improving exploiting modification direction method [C]//Ninth International Conference on Hybrid Intelligent Systems. Shenyang: Shenyang Normal University, 2009: 6972[15]Zhang X, Wang S. Efficient steganographic embedding by exploiting modification direction [J]. IEEE Communications Letters, 2006, 10(11): 13 |