TY - STD TI - W Mazurczyk, K Szczypiorski, Trends in Steganography, Communications of the ACM, March 2014, Vol. 57 No. 3, Pages 86–95 ID - ref1 ER - TY - JOUR AU - Fridrich, J. AU - Lisonek, P. PY - 2007 DA - 2007// TI - Grid coloring in steganography JO - IEEE Trans. Inform. Theory VL - 53 UR - https://doi.org/10.1109/TIT.2007.892768 DO - 10.1109/TIT.2007.892768 ID - Fridrich2007 ER - TY - JOUR AU - Kim, H. J. AU - Kim, C. AU - Choi, Y. AU - Wang, S. AU - Zhang, X. PY - 2010 DA - 2010// TI - Improved modification direction methods JO - Computer & Math Application VL - 60 UR - https://doi.org/10.1016/j.camwa.2010.01.006 DO - 10.1016/j.camwa.2010.01.006 ID - Kim2010 ER - TY - JOUR AU - Yang, C. N. AU - Ye, G. -. C. AU - Kim, C. PY - 2011 DA - 2011// TI - Data hiding in halftone images by XOR block-wise operation with difference minimization JO - KSII Trans Internet Info System VL - 5 UR - https://doi.org/10.3837/tiis.2011.02.013 DO - 10.3837/tiis.2011.02.013 ID - Yang2011 ER - TY - BOOK AU - Crandall, R. PY - 1998 DA - 1998// TI - Some Notes on Steganography ID - Crandall1998 ER - TY - JOUR AU - Fridrich, J. AU - Soukal, D. PY - 2006 DA - 2006// TI - Matrix embedding for large payloads JO - IEEE Trans. Inf. Forensics Secur. VL - 1 UR - https://doi.org/10.1109/TIFS.2006.879281 DO - 10.1109/TIFS.2006.879281 ID - Fridrich2006 ER - TY - JOUR AU - Westfeld, A. PY - 2001 DA - 2001// TI - F5: A steganographic algorithm. Proceedings of the 4th international workshop information hiding JO - Lect. Notes Comput. Sci VL - 2137 UR - https://doi.org/10.1007/3-540-45496-9_21 DO - 10.1007/3-540-45496-9_21 ID - Westfeld2001 ER - TY - JOUR AU - Luo, W. AU - Huang, F. AU - Huang, J. PY - 2010 DA - 2010// TI - Edge adaptive image steganography based on LSB matching revisited JO - IEEE Trans. Inf. Forensics Secur. VL - 5 UR - https://doi.org/10.1109/TIFS.2010.2041812 DO - 10.1109/TIFS.2010.2041812 ID - Luo2010 ER - TY - JOUR AU - Fridrich, J. AU - Goljan, M. AU - Lisonek, P. PY - 2005 DA - 2005// TI - Writing on wet paper JO - IEEE Trans. Inf. Forensics Secur. VL - 53 ID - Fridrich2005 ER - TY - STD TI - S Hetzl, P Mutzel, A graph–theoretic approach to steganography. Communications and Multimedia Security. CMS 2005. Lecture Notes in Computer Science, vol 3677, pp. 119-128. Springer, Berlin, Heidelberg ID - ref10 ER - TY - JOUR AU - Mao, Q. PY - 2014 DA - 2014// TI - A fast algorithm for matrix embedding steganography JO - Digital Signal Process VL - 25 UR - https://doi.org/10.1016/j.dsp.2013.11.001 DO - 10.1016/j.dsp.2013.11.001 ID - Mao2014 ER - TY - BOOK AU - Cachin, C. PY - 1998 DA - 1998// TI - An Information-Theoretic Model Steganography, IH98, LNCS 1525 PB - Springer Verlag CY - Heidelberg ID - Cachin1998 ER - TY - JOUR AU - Yang, T. AU - Chen, H. PY - 2017 DA - 2017// TI - Matrix embedding in steganography with binary reed-Muller codes JO - IET Image Process VL - 11 UR - https://doi.org/10.1049/iet-ipr.2016.0655 DO - 10.1049/iet-ipr.2016.0655 ID - Yang2017 ER - TY - JOUR AU - Gao, Z. Z. AU - Wei, D. W. AU - Tang, G. M. PY - 2017 DA - 2017// TI - Fast matrix embedding based on random linear code JO - ACTA Electronic SINICA VL - 45 ID - Gao2017 ER - TY - JOUR AU - Kim, C. AU - Yang, C. -. N. PY - 2016 DA - 2016// TI - Data hiding based on overlapped pixels using hamming code JO - Multimedia Tools Application VL - 75 UR - https://doi.org/10.1007/s11042-014-2355-x DO - 10.1007/s11042-014-2355-x ID - Kim2016 ER - TY - JOUR AU - Sarkar, A. AU - Madhow, U. AU - Manjunath, B. S. PY - 2010 DA - 2010// TI - Matrix embedding with pseudo random coefficient selection and error correction for robust and secure steganography JO - IEEE Trans. Inf. Forensics Secur. VL - 5 UR - https://doi.org/10.1109/TIFS.2010.2046218 DO - 10.1109/TIFS.2010.2046218 ID - Sarkar2010 ER - TY - JOUR AU - Chang, C. C. AU - Kieu, T. D. AU - Chou, Y. C. PY - 2008 DA - 2008// TI - A high payload steganographic scheme based on (7,4) hamming code for digital images, proc JO - Int Symp Elec Comm and Sec VL - 2008 ID - Chang2008 ER - TY - STD TI - YK Gao, XL Li, TY Zeng, B Yang, Improving Embedding Efficiency Via Matrix Embedding: A Case Study, Proc.16th IEEE International Conference on Image Processing (ICIP, 2009), pp. 109–112 ID - ref18 ER - TY - STD TI - JY Chen, YF Zhu, Y Shen, WM Zhang, Efficient matrix embedding based on random linear codes. 2010 International Conference on Multimedia Information Networking and Security, Proc. MINES 2010, pp. 879–883, Dec. 2010 ID - ref19 ER - TY - STD TI - Y Gao, X Li, B Yang, Constructing specific matrix for efficient matrix embedding. 2009 IEEE International Conference on Multimedia and Expo, pp. 1006–1009, Jun. 2009 ID - ref20 ER - TY - JOUR AU - Filler, T. AU - Judas, J. AU - Fridrich, J. PY - 2011 DA - 2011// TI - Minimizing additive distortion in steganography using syndrome-trellis codes JO - IEEE Trans. Inf. Forensics Secur. VL - 6 UR - https://doi.org/10.1109/TIFS.2011.2134094 DO - 10.1109/TIFS.2011.2134094 ID - Filler2011 ER - TY - JOUR AU - Kim, C. AU - Yang, C. -. N. PY - 2016 DA - 2016// TI - Data hiding based on overlapped pixels using hamming code JO - Multimed Tools Appl VL - 75 UR - https://doi.org/10.1007/s11042-014-2355-x DO - 10.1007/s11042-014-2355-x ID - Kim2016 ER - TY - JOUR AU - Hui, T. AU - Jie, Q. AU - Yong-feng, H. PY - 2015 DA - 2015// TI - Optimal matrix embedding for voice-over-IP steganography JO - Signal Process. VL - 117 UR - https://doi.org/10.1016/j.sigpro.2015.05.001 DO - 10.1016/j.sigpro.2015.05.001 ID - Hui2015 ER - TY - JOUR AU - Chao, W. AU - Wei-ming, Z. AU - Jiu-fen, L. PY - 2012 DA - 2012// TI - Fast matrix embedding by matrix extending JO - IEEE Trans Inf Forens Secur VL - 7 UR - https://doi.org/10.1109/TIFS.2011.2164907 DO - 10.1109/TIFS.2011.2164907 ID - Chao2012 ER - TY - JOUR AU - Liu, G. AU - Liu, W. AU - Dai, Y. PY - 2014 DA - 2014// TI - Adaptive steganography based on block complexity and matrix embedding JO - Multimedia Systems VL - 20 UR - https://doi.org/10.1007/s00530-013-0313-5 DO - 10.1007/s00530-013-0313-5 ID - Liu2014 ER - TY - JOUR AU - Fridrich, J. AU - Goljan, M. AU - Du, R. PY - 2001 DA - 2001// TI - Detecting LSB steganography in color, and gray-scale images JO - Multimedia IEEE VL - 8 UR - https://doi.org/10.1109/93.959097 DO - 10.1109/93.959097 ID - Fridrich2001 ER - TY - JOUR AU - Bai, J. AU - Chang, C. C. PY - 2016 DA - 2016// TI - A high payload steganographic scheme for compressed images with hamming code JO - Int J Netw Sec VL - 18 ID - Bai2016 ER - TY - JOUR AU - Zhang, X. AU - Wang, S. PY - 2012 DA - 2012// TI - Efficient data hiding with histogram preserving property JO - Telecommunication System VL - 49 UR - https://doi.org/10.1007/s11235-010-9364-5 DO - 10.1007/s11235-010-9364-5 ID - Zhang2012 ER - TY - CHAP AU - Zhang, W. AU - Zhang, X. AU - Wang, S. PY - 2008 DA - 2008// TI - Maximizing steganographic embedding efficiency by combining hamming codes and wet paper codes BT - Lecture Notes in Computer Science: Vol. 5284. Proceedings of the 10th Information Hiding Workshop PB - Springer CY - Berlin ID - Zhang2008 ER - TY - CHAP AU - Sallee, P. PY - 2004 DA - 2004// TI - Model-based steganography BT - Lecture Notes in Computer Science: Vol. 2939. Proceedings of the 6th Information Hiding Workshop PB - Springer CY - Berlin ID - Sallee2004 ER - TY - CHAP AU - Zhang, X. AU - Wang, S. AU - Zhang, K. PY - 2003 DA - 2003// TI - Steganography with least histogram abnormality BT - Lecture Notes in Computer Science: Vol. 2776. Computer Network Security PB - Springer CY - Berlin ID - Zhang2003 ER - TY - CHAP AU - Wu, H. AU - Dugelay, J. PY - 2008 DA - 2008// TI - Cheung Y. A data mapping method for steganography and its application to images BT - Lecture Notes in Computer Science: Vol. 5284. Proceedings of the 10th Information Hiding Workshop PB - Springer CY - Berlin ID - Wu2008 ER - TY - STD TI - Yang R.E., Tao S., Zheng Z.W., et al., A digital image steganography method, Patent No.: ZL 2014 1 0277228.8 CN 104050624A. ID - ref33 ER -