Zhang X,Wang S.Steganography using multiple-base notational system and human vision sensitivity[J].IEEE Signal Processing Letters,2005,12(1):67~70.
[2]
Chang C C,Chuang J C,Lai Y P.Hiding data in multitone images for data communications[J].IEE Proc.-Vis.Image Signal Process,2004,151(2):137 ~ 145.
[3]
Dumistrescu S,Wu Xiao-lin,Wang Zhe.Detecting of LSB steganography via sample pair analysis[J].IEEE Transactions on Signal Processing,2003,51(7):1995 ~ 2007.
[4]
Fridrich J,Goljan M,Du R.Detecting LSB steganography in color and gray-scale images[J].Magazine of IEEE Multimedia,2001,8(4):22 ~28.
[5]
Petitcolas F A P,Anderson R J,Kuhn M G.Information hiding-a survey[J].Proceedings of IEEE,1999,87(7):1062 ~ 1078.
[6]
Wang H,Wang S.Cyber warfare-steganography vs.steganalysis[J].Communication of the ACM,2004,47 (10):76 ~ 82.
[7]
Noda H,Spaulding J,Shirazi M N,et al.Application of bit-plane decomposition steganography to JPEG2000 encoded images[J].IEEE Signal Processing Letters,2002,9 (12):410 ~ 413.
[8]
Wu D C,Tsai W H.A steganographic method for images by pixelvalue differencing[J].Pattern Recognition Letters,2003,24 (9 -10):1613 ~ 1626.
[9]
Wu D C,Tsai W H.Data hiding in images via multiple-based number conversion and lossy compression[J].IEEE Transactions on Consumer Electronics,1998,44(4):1406~ 1412.
[10]
Chao H M,Hsu C M,Miaou S G.A data-hiding technique with authentication,integration,and confidentiality for electronic patient records[J].IEEE Transactions on Information Technology in Biomedicine,2002,6(1):46 ~53.