IBM Systems Journal
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Stretching the Limits of Steganography
Proceedings of the First International Workshop on Information Hiding
Proceedings of the First International Workshop on Information Hiding
The history of subliminal channels
IEEE Journal on Selected Areas in Communications
Results concerning the bandwidth of subliminal channels
IEEE Journal on Selected Areas in Communications
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Digital Steganography: Hiding Data within Data
IEEE Internet Computing
IEEE Transactions on Computers
A Novel Data Hiding Method for Two-Color Images
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
An Adaptive Steganographic Scheme for Color Images
Fundamenta Informaticae
A coding problem in steganography
Designs, Codes and Cryptography
A General Data Hiding Framework and Multi-level Signature for Binary Images
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
IEICE - Transactions on Information and Systems
Reading Watermarks from Printed Binary Images with a Camera Phone
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Tree Structure Based Data Hiding for Progressive Transmission Images
Fundamenta Informaticae
Fast and near optimal parity assignment in palette images with enhanced CPT scheme
ACIIDS'10 Proceedings of the Second international conference on Intelligent information and database systems: Part II
International Journal of Electronic Security and Digital Forensics
On the maximality of secret data ratio in CPTE schemes
ACIIDS'11 Proceedings of the Third international conference on Intelligent information and database systems - Volume Part I
Watermark recovery from a dual layer hologram with a digital camera
SCIA'11 Proceedings of the 17th Scandinavian conference on Image analysis
A high throughput system for intelligent watermarking of bi-tonal images
Applied Soft Computing
Run length based steganography for binary images
PReMI'05 Proceedings of the First international conference on Pattern Recognition and Machine Intelligence
Alteration-locating authentication watermarking for binary images
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Binary image steganographic techniques classification based on multi-class steganalysis
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
On fastest optimal parity assignments in palette images
ACIIDS'12 Proceedings of the 4th Asian conference on Intelligent Information and Database Systems - Volume Part II
An Adaptive Steganographic Scheme for Color Images
Fundamenta Informaticae
A new data hiding scheme for small blocks of twelve pixels on binary images by module approach
ACIIDS'13 Proceedings of the 5th Asian conference on Intelligent Information and Database Systems - Volume Part I
Hi-index | 0.00 |
In this paper, we propose a new steganography scheme for hiding a piece of critical information in a host binary image (such as facsimiles). A secret key and a weight matrix are used to protect the hidden data. Given an image block of size m 脳 n, our scheme can hide as many as [log2 (mn + 1)] bits of data in the image by changing at most 2 bits in the image. This scheme, as compared to an existing scheme [18], can provide higher security, embed more data, and maintain higher quality of the host image.