Next: About this document ...
Up: SECURE HIGH DATA EMBEDDING
Previous: Conclusion
- 1
-
M. D. Swanson, M. Kobayashi, and A. H. Tewfik,
``Multimedia data embedding and watermarking technologies,''
Proc. of IEEE, vol. 86, no. 6, pp. 1064-1087, June 1998.
- 2
-
W. Bender, D. Gruhl, and N. Morimoto,
``Techniques for data hiding,''
Proc. SPIE, Storage and Retrieval for Images and
Video Databases III, vol. 2420, pp. 40-50, February 1995.
- 3
-
J. Fridrich,
``A New Steganographic Method for Pallete-based Images,''
Proc. of the ISET PICS conference, pp. 285-289, Savanah,
Georgia, April 1998.
- 4
-
J. R. Smith and B. O. Comisky,
``Modulation and information hiding in images,''
in Information hiding workshop, Lecture notes in computer
science, Germany, 1996, vol. 1174, pp. 207-226, Springer-Verlag.
- 5
-
D. Aucsmith,
Information Hiding: Second International Workshop, volume 1525
of Lecture Notes in Computer Science,
Springer-Verlag, Berlin, Portland, Oregon, U.S.A, 1998.
- 6
-
R. Anderson and F. Petitcolas,
``On the Limits of Steganography,''
IEEE Jour. Selected Areas Comms, vol.
16, no. 4, pp. 474-481, May 1998.
- 7
-
S. Katzenbeisser and F. A. Petitcolas,
Information Hiding Techniques for Steganography and Digital
Watermarking,
Artech House, Massachusetts, U. S. A, 2000.
- 8
-
A. Jain,
Fundamentals Of Digital Image Processing,
Prentice Hall, Englewood Cliffs, NJ, 1989.
- 9
-
A. Papoulis,
Probability, Random Variables, and Stochastic Processes,
edition,
McGraw-Hill, New York, 1991.
- 10
-
S. Haykin,
Communication Systems, edition,
John Wiley & Sons, New York, U. S. A, 1994.
- 11
-
T. M. Cover and J. A. Thomas,
Elements of Information Theory,
John Wiley & Sons, New York, 1991.
- 12
-
C. Cachin,
``An information theoretic model for steganography,''
in (Aucsmith, eds) Information Hiding: Second International
Workshop, volume 1525 on Lecture Notes in Computer Science, pp. 218-238.,
Jan 1998.
Muhammad Zubair Ikram
7/14/2000