Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hall, E.L. (1979): Computer image processing and recognition. Academic Press, New York
Jain, A.K. (1989): Fundamentals of digital image processing. Prentice Hall, Englewood Cliffs, NJ
Kawaguchi, E., Endo, T., Matsunaga, J. (1983): Depth-first picture expression viewed from digital picture processing. IEEE Trans. on PAMI 5 373-384
. Kawaguchi, E., Taniguchi, R.: Complexity of binary pictures and image thresholding — An application of DF-Expression to the thresholding problem. Proceedings of 8th ICPR, 2, 1221-1225
Kawaguchi, E., Taniguchi, R. (1989): The DF-Expression as an image thresholding strategy. IEEE Trans. on SMC, 19, 1321-1328
Kamata, S., Eason, R.O., Kawaguchi, E. (1995): Depth-first Coding for multivalued pictures using bit-plane decomposition. IEEE Trans. on Commun., 43, 1961-1969
. Kawaguchi, E., Niimi, M. (1988): Modeling digital image into informative and noise-like regions by complexity measure. Information Modelling and Knowledge Bases XV, IOS Press, 255-265
. Nozaki, K., Noda, H., Kawaguchi, E., Eason, R. (2005): A model of unforge-able digital certificate document system. Information Modelling and Knowledge Bases XVI, IOS Press, 203-210
Niimi, M., Noda, H., Kawaguchi, E. (1999): Steganography based on region segmentation with a complexity measure. Systems and Computers in Japan, 30,1-9
. Katzenbeisser, S., Petitcolas, F.A.P. (2000): Information hiding techniques for steganography and digital watermarking. Artech House, 79-93
. Johnson, N.F., Duric, Z., Jajodia, S. (2001): information hiding: steganography and watermarking — attacks and countermeasures. Kluwer Academic Publishers, 47-76
. Wayner, P. (2002): Disappearing cryptography: information hiding: steganography & watermarking. Morgan Kaufmann Publishers, 303-314
Rabbani, M., Joshi R. (2002): An overview of JPEG 2000 still image compression standard. Signal Processing: Image Communication, 17, 3-48
Taubman, D. (2000): High performance scalable image compression with EBCOT. IEEE Trans. Image Process., 9, 1158-1170
Shapiro, J.M. (1993): Embedded image coding using zerotrees of wavelet coefficients. IEEE Trans. Signal Process., 41, 3445-3462
Said, A., Pearlman, W.A. (1996): A new, fast, and efficient image codec based on set partitioning in hierarchical trees. IEEE Trans. Circuits and Systems for Video Technology, 6, 243-250
. Upham, D. (1997): http://ftp.funet.fi/pub/crypt/cypherpunks/steganography/jsteg/
Westfeld, A. (2001): F5 - A steganographic algorithm: high capacity despite better steganalysis. Lecture Notes in Computer Science, 2137, 289-302
Fridrich, J., Goljan M., Hogea, D. (2003): New methodology for breaking steganographic techniques for JPEGs. Proc. of SPIE, 5020, 143-155
Chen, B., Wornell, G.W. (2001): Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. on Information Theory, 47, 1423-1443
. http://www.csdinc.co.jp/archiver/lib/main-e.html http://www2.nsknet.or.jp/micco/english/unlha32 e.htm
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Noda, H., Niimi, M., Kawaguchi, E. (2007). Steganographic Methods Focusing on BPCS Steganography. In: Pan, JS., Huang, HC., Jain, L.C., Fang, WC. (eds) Intelligent Multimedia Data Hiding. Studies in Computational Intelligence, vol 58. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71169-8_8
Download citation
DOI: https://doi.org/10.1007/978-3-540-71169-8_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71168-1
Online ISBN: 978-3-540-71169-8
eBook Packages: EngineeringEngineering (R0)