next up previous
Next: About this document ... Up: SECURE HIGH DATA EMBEDDING Previous: Conclusion

References

1
M. D. Swanson, M. Kobayashi, and A. H. Tewfik,
``Multimedia data embedding and watermarking technologies,''
Proc. of IEEE, vol. 86, no. 6, pp. 1064-1087, June 1998.

2
W. Bender, D. Gruhl, and N. Morimoto,
``Techniques for data hiding,''
Proc. SPIE, Storage and Retrieval for Images and Video Databases III, vol. 2420, pp. 40-50, February 1995.

3
J. Fridrich,
``A New Steganographic Method for Pallete-based Images,''
Proc. of the ISET PICS conference, pp. 285-289, Savanah, Georgia, April 1998.

4
J. R. Smith and B. O. Comisky,
``Modulation and information hiding in images,''
in Information hiding workshop, Lecture notes in computer science, Germany, 1996, vol. 1174, pp. 207-226, Springer-Verlag.

5
D. Aucsmith,
Information Hiding: Second International Workshop, volume 1525 of Lecture Notes in Computer Science,
Springer-Verlag, Berlin, Portland, Oregon, U.S.A, 1998.

6
R. Anderson and F. Petitcolas,
``On the Limits of Steganography,''
IEEE Jour. Selected Areas Comms, vol. 16, no. 4, pp. 474-481, May 1998.

7
S. Katzenbeisser and F. A. Petitcolas,
Information Hiding Techniques for Steganography and Digital Watermarking,
Artech House, Massachusetts, U. S. A, 2000.

8
A. Jain,
Fundamentals Of Digital Image Processing,
Prentice Hall, Englewood Cliffs, NJ, 1989.

9
A. Papoulis,
Probability, Random Variables, and Stochastic Processes, edition,
McGraw-Hill, New York, 1991.

10
S. Haykin,
Communication Systems, edition,
John Wiley & Sons, New York, U. S. A, 1994.

11
T. M. Cover and J. A. Thomas,
Elements of Information Theory,
John Wiley & Sons, New York, 1991.

12
C. Cachin,
``An information theoretic model for steganography,''
in (Aucsmith, eds) Information Hiding: Second International Workshop, volume 1525 on Lecture Notes in Computer Science, pp. 218-238., Jan 1998.


Muhammad Zubair Ikram
7/14/2000