參考文獻 |
[1] TrendLabs, “2009s most persistent malware threats,” Trend Micro, Incorporated, 2010.
[2] Arbor Networks, “Worldwide infrastructure security report,” Available at: http://www.arbornetworks.com/research/infrastructure-security-report. (Accessed: 2013).
[3] X.P. Zhang, K. Li, and X. Wang, “A novel look-up table design method for data hiding with reduced distortion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 18, no. 6, pp. 769–776, 2008.
[4] F. Cayre and P. Bas, “Kerckhoffs-based embedding security classes for WOA data hiding,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 1–15, 2008.
[5] L. Perez-Freire and F. Perez-Gonzalez, “Security of lattice-based data hiding against the watermarked-only attack,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 4, pp. 593–610, 2008.
[6] O. Bulan, G. Sharma, and V. Monga, “Orientation modulation for data hiding in clustered-dot halftone prints,” IEEE Transactions on Image Processing, vol. 19, no. 8, pp. 2070–2084, 2010.
[7] N. Liu, P. Amin, and K. P. Subbalakshmi, “Security and robustness enhancement for image data hiding,” IEEE Transactions on Multimedia, vol. 9, no. 3, pp. 466–474, 2007.
[8] K.S. Wong, K. Tanaka, K. Takagi, and Y. Nakajima, “Complete video quality-preserving data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 10, pp. 1499–1512, 2009.
[9] N. I. Wu, K. C. Fu, and C. M. Wang, “A novel data hiding method for grayscale images based on pixel-value differencing and modulus function,” Journal of Internet Technology, vol. 11, no. 7, pp. 1071–1082, 2010.
[10] W.C. Hsieh, N.I. Wu, and C.M. Wang, “A novel data hiding scheme for binary images with low distortion,” Journal of Internet Technology, vol. 11, no. 7, pp. 1057–1070, 2010.
[11] A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Processing, vol. 90, no. 3, pp. 727–752, 2010.
[12] H.C. Wu, H.C. Wang, C.S Tsai, and C.M. Wang, “Reversible image steganographic scheme via predictive coding,” Displays, vol. 31, no. 1, pp. 35–43, 2010.
[13] C.H. Yang, C.Y. Weng, S.J. Wang, and H.M. Sun, “Varied PVD + LSB evading detection programs to spatial domain in data embedding systems,” Journal of Systems and Software, vol. 83, no. 10, pp. 1635–1643, 2010.
[14] C.H. Huang, S.C. Chuang, and J.L. Wu, “Digital-invisible-ink data hiding based on spread-spectrum and quantization techniques,” IEEE Transactions on Multimedia, vol. 10, no. 4, pp. 557–569, 2008.
[15] Y.M. Cheng and C.M. Wang, “A novel approach to steganography in high- dynamic-range images,” IEEE Transactions on Multimedia, vol. 16, no. 3, pp. 70–80, 2009.
[16] L. Zhang, H. Wang, and R. Wu, “A high-capacity steganography scheme for JPEG2000 baseline system,” IEEE Transactions on Image Processing, vol. 18, no. 8, pp. 1797–1803, 2009.
[17] W. Luo, F. Huang, and J. Huang, “Edge adaptive image steganography based on LSB matching revisited,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 201–214, 2010.
[18] M. Gkizeli, D.A. Pados, and M.J. Medley, “Optimal signature design for spread-spectrum steganography,” IEEE Transactions on Image Processing, vol. 16, no. 2, pp. 391–405, 2007.
[19] X. Li and J. Wang, “A steganographic method based upon JPEG and particle swarm optimization algorithm,” Information Sciences, vol. 177, no. 15, pp. 3099–3109, 2007.
[20] A. Sarkar, U. Madhow, and B. S. Manjunath, “Matrix embedding with pseudorandom coefficient selection and error correction for robust and secure steganography,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 225–239, 2010.
[21] S.S.M. Chow and W.S. Yap, “Partial decryption attacks in security-mediated certificateless encryption,” IET Information Security, vol. 3, no. 4, pp. 148–151, 2009.
[22] J. Zhou, O.C. Au, and H.W. Wong, “Adaptive chosen-ciphertext attack on secure arithmetic coding,” IEEE Transactions on Signal Processing, vol. 57, no. 5, pp. 1825–1838, 2009.
[23] P. Tsai, “Histogram-based reversible data hiding for vector quantisation-compressed images,” IET Image Processing, vol. 3, no. 2, pp. 100–114, 2009.
[24] C.H. Yang and M.H. Tsai, “Improving histogram-based reversible data hiding by interleaving predictions,” IET Image Processing, vol. 4, no. 4, pp. 223–234, 2010.
[25] C.K. Chan and L.M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition, vol. 37, no. 3, pp. 469–474, 2004.
[26] R.Z. Wang, C.F. Lin, and J.C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, vol. 34, no. 3, pp. 671–683, 2001.
[27] J. Wang, Y. Sun, H. Xu, K. Chen, H. J. Kim, and S. H. Joo, “An improved section-wise exploiting modification direction method,” Signal Processing, vol. 90, no. 11, pp. 2954–2964, 2010.
[28] H.M. Sun, C.Y. Weng, C.F. Lee, and C.H. Yang, “Anti-forensics with steganographic data embedding in digital images,” IEEE Journal on Selected Areas in Communications, vol. 29, no. 7, pp. 1392–1403, 2011.
[29] C.H. Yang, C.Y. Weng, H.K. Tso, and S.J. Wang, “A data hiding scheme using the varieties of pixel-value differencing in multimedia images,” Journal of Systems and Software, vol. 84, no. 4, pp. 669–678, 2011.
[30] C.H. Hsieh and J.C. Tsai, “Lossless compression of VQ index with search-order coding,” IEEE Transactions on Image Processing, vol. 5, no. 11, pp. 1579–1582, 1996.
[31] C.C. Chang and W.C. Wu, “A reversible information hiding scheme based on vector quantization,” Knowledge-Based Intelligent Information and Engineering Systems, Lecture Notes in Computer Science, vol. 3683, 2005.
[32] D.C. Lou, C.L. Chou, H.K. Tso, and C.C. Chiu, “Active steganalysis for histogram-shifting based reversible data hiding,” Optics Communications, vol. 285, no. 10–11, pp. 2510–2518, 2012.
[33] J. Fridrich, M. Goljan, and R. Du, “Reliable detection of LSB steganography in color and grayscale images,” in Proceedings of the 2001 workshop on Multimedia and security: new challenges, New York, NY, USA, 2001, pp. 27–30.
[34] Guillermito, “Steganography: A few tools to discover hidden data,” http://guillermito2.net/stegano/tools/index.html, 2004.
[35] R. Cogranne and F. Retraint, “An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 3, pp. 464 –476, Mar. 2013.
[36] X. Zhang and S. Wang, “Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security,” Pattern Recogn. Lett., vol. 25, no. 3, pp. 331–339, Feb. 2004.
[37] Y. Linde, A. Buzo, and R. Gray, “An algorithm for vector quantizer design,” IEEE Transactions on Communications, vol. 28, no. 1, pp. 84–95, 1980.
[38] C.C. Chen and C.C. Chang, “High capacity SMVQ-based hiding scheme using adaptive index,” Signal Processing, vol. 90, no. 7, pp. 2141–2149, 2010.
[39] C.C. Chang and C.Y. Lin, “Reversible steganography for VQ-compressed images using side matching and relocation,” IEEE Transactions on Information Forensics and Security, vol. 1, no. 4, pp. 493–501, 2006.
[40] C.C. Chang, W.L. Tai, and C.C. Lin, “A reversible data hiding scheme based on side match vector quantization,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 10, pp. 1301–1308, 2006.
[41] Y.C. Hu, “High-capacity image hiding scheme based on vector quantization,” Pattern Recognition, vol. 39, no. 9, pp. 1715–1724, 2006.
[42] S.C. Shie, S.D. Lin, and J.H. Jiang, “Visually imperceptible image hiding scheme based on vector quantization,” Information Processing & Management, vol. 46, no. 5, pp. 495–501, 2010.
[43] W.C. Du and W.J. Hsu, “Adaptive data hiding based on VQ compressed images,” IEE Proceedings Vision, Image & Signal Processing, vol. 150, no. 4, pp. 233–238, 2003.
[44] C.C. Chang and W.C. Wu, “Hiding secret data adaptively in vector quantisation index tables,” IEE Proceedings Vision, Image & Signal Processing, vol. 153, no. 5, pp. 589–597, 2006.
[45] C.C. Lin, S.C. Chen, and N.L. Hsueh, “Adaptive embedding techniques for VQ-compressed images,” Information Sciences, vol. 179, no. 1–2, pp. 140–149, 2009.
[46] C. C. Lee, W. H. Ku, and S. Y. Huang, “A new steganographic scheme based on vector quantisation and search-order coding,” IET Image Process., vol. 3, no. 4, pp. 243–248, 2009.
[47] J. J. Shen and J. M. Ren, “A robust associative watermarking technique based on vector quantization,” Digital Signal Processing, vol. 20, no. 5, pp. 1408–1423, 2010.
[48] C.H. Yang and Y.C. Lin, “Fractal curves to improve the reversible data embedding for VQ-indexes based on locally adaptive coding,” Journal of Visual Communication and Image Representation, vol. 21, no. 4, pp. 334–342, 2010.
[49] C.H. Yang and Y.C. Lin, “Reversible data hiding of a VQ index table based on referred counts,” Journal of Visual Communication and Image Representation, vol. 20, no. 6, pp. 399–407, 2009.
[50] Z. M. Lu, J. X. Wang, and B. B. Liu, “An improved lossless data hiding scheme based on image VQ-index residual value coding,” Journal of Systems and Software, vol. 82, no. 6, pp. 1016–1024, 2009.
[51] S.C. Shie and S.D. Lin, “Data hiding based on compressed VQ indices of images,” Computer Standards & Interfaces, vol. 31, no. 6, pp. 1143–1149, 2009.
[52] J. X. Wang and Z. M. Lu, “A path optional lossless data hiding scheme based on VQ joint neighboring coding,” Information Sciences, vol. 179, no. 19, pp. 3332–3348, 2009.
[53] Z.H. Wang, C.C. Chang, K.N. Chen, and M.C. Li, “An encoding method for both image compression and data lossless information hiding,” Journal of Systems and Software, vol. 83, no. 11, pp. 2073–2082, 2010.
[54] L.S. Chen and J.C. Lin, “Steganography scheme based on side match vector quantization,” Optical Engineering, vol. 49, no. 3, pp. 0370081–0370087, 2010.
[55] W. J. Chen and W. T. Huang, “VQ indexes compression and information hiding using hybrid lossless index coding,” Digital Signal Processing, vol. 19, no. 3, pp. 433–443, 2009.
[56] C. F. Lee, H. L. Chen, and S. H. Lai, “An adaptive data hiding scheme with high embedding capacity and visual image quality based on SMVQ prediction through classification codebooks,” Image and Vision Computing, vol. 28, no. 8, pp. 1293–1302, 2010.
[57] C. C. Chang, T. D. Kieu, and W. C. Wu, “A lossless data embedding technique by joint neighboring coding,” Pattern Recognition, vol. 42, no. 7, pp. 1597–1603, 2009.
[58] C.H. Yang, S.C. Wu, S.C. Huang, and Y.K. Lin, “Huffman-code strategies to improve MFCVQ-based reversible data hiding for VQ indexes,” Journal of Systems and Software, vol. 84, no. 3, pp. 388–396, 2011.
[59] C.T. Huang, W.J. Wang, C.H. Yang, and S.J. Wang, “A scheme of reversible information hiding based on SMVQ,” The Imaging Science Journal, vol. 61, no. 2, pp. 195-203, 2013.
[60] P. Bas and T. Furon, “BOWS-2,” http://bows2.ec-lille.fr/, 2007.
[61] L. Fillatre, “Adaptive steganalysis of least significant bit replacement in grayscale natural images,” IEEE Transactions on Signal Processing, vol. 60, no. 2, pp. 556 –569, 2012. |