參考文獻 |
[1] R. J. Anderson. Stretching the Limits of Steganography. In Information Hiding, Springer Lecture Notes in Computer Science, volume 1174, pages 39—48, 1996.
[2] R. J. Anderson and F. A. P. Petitcolas. On the Limits of Steganography. IEEE J. on Selected Areas in Communications, 16(4):474—481, May 1998.
[3] W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for Data Hiding. IBM System, 35(3—4),February 1996.
[4] Y.-Y. Chen, H.-K. Pan, and Y.-C. Tseng. A Secure Data Hiding Scheme for Two-Color Images. In IEEE Symp. on Computers and Communications, 2000.
[5] E. Franz et al. Computer-Based Steganography. In Information Hiding, Springer Lecture Notes in Computer Science, volume 1174, pages 7—21, 1996.
[6] M. S. Fu and O. Au. Data hiding by smart pair toggling for halftone images. In IEEE Inter. Conf. on Acoustics, Speech, and Signal Processing, pages 2318 —2321, April 2000.
[7] M. S. Fu and O. C. Au. Data Hiding By Smart Pair Toggling For Halfton Image. In IEEE In-ternational Conference on Acoustics, Speech, and Signal Processing, 2000. ICASSP ’00, pages 2318—2321, 2000.
[8] D. Gruhl and W. Bender. Information Hiding to Foil the Casual Counterfeiter. In Proceedings of the Workshop on Information Hiding, IH’98, Portland, Oregon, USA, April 1998.
[9] S. Katzenbeisser and F. A. P. Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, 2000.
[10] D. Kohn. The Codebreakers: The Story of Secret Writing. Scribner, New York, 1996.
[11] G. J. Simmons. The Prisoners’ Problem and the Subliminal Channel. In CRYPTO’83, pages 51—67.
[12] G. J. Simmons. Results Concerning the Bandwidth of Subliminal Channels. IEEE J. on Selected Areas in Communications, 16(4):463—473, May 1998.
[13] G. J. Simmons. The History of Subliminal Channels. IEEE J. on Selected Areas in Communications,16(4):452—462, May 1998.
[14] W. Stallings. Cryptography and Network Security. Prentice Hall, New Jersey, 1999.
[15] Y.-C. Tseng and H.-K. Pan. Secure and Invisible Data Hiding in 2-Color Images. In IEEE INFO-COM,2001.
[16] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne. A Digital Watermark. In IEEE Int. Conf.Image Processing, volume 2, pages 86—90, 1994.
[17] M. Wu, E. Tang, and B. Liu. Data Hiding in Digital Binary Image. In IEEE Inter. Conf. on Multimedia and Expo, ICME’00, New York, USA, 2000.
[18] M. Y. Wu and J. H. Lee. A Novel Data Embedding Method for Two-Color Facsimile Images. In Proceedings of International Symposium on Multimedia Information Processing, Chung-Li, Taiwan,R.O.C, December 1998.
[19] J. Zhao and E. Koch. Embedding Robust Labels into Images for Copyright Protection. In Proceed-ings of the International Conference on Intellectual Property Rights for Information, Knowledge and New Techniques, pages 242—251, Munchen, Wien, 1995. |