The Community for Technology Leaders
RSS Icon
Issue No.03 - July-September (2009 vol.16)
pp: 70-80
Yu-Ming Cheng , National Chung Hsing University, Taiwan
<p>A steganographic method for hiding messages uses high-dynamic-range images. The technique provides for authentication, a large embedding capacity, and limited distortion.</p>
high dynamic range image, steganography, authentication, encryption, multimedia and graphics
Yu-Ming Cheng, "A Novel Approach to Steganography in High- Dynamic-Range Images", IEEE MultiMedia, vol.16, no. 3, pp. 70-80, July-September 2009, doi:10.1109/MMUL.2009.43
1. F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, "Information Hiding—A Survey," Proc. IEEE, special issue on protection of multimedia content, vol. 87, no. 7, 1999, pp. 1062-1078.
2. G.J. Ward, "The Radiance Lighting Simulation and Rendering System," Proc. Siggraph, ACM Press, 1994, pp. 459-472.
3. E. Reinhard et al., High Dynamic Range Imaging: Acquisition, Display, and Image-Based Lighting, Morgan Kaufmann, 2005.
4. C.C. Chang and H.W. Tseng, "A Steganographic Method for Digital Images Using Side Match," Pattern Recognition Letters, vol. 25, no. 12, 2004, pp. 1431-1437.
5. X. Zhang and S. Wang, "Steganography Using Multiple-Base Notational System and Human Vision Sensitivity," IEEE Signal Processing Letters, vol. 12, no. 1, 2005, pp. 67-70.
6. J.A. Ferwerda, "Elements of Early Vision for Computer Graphics," IEEE Computer Graphics and Applications, vol. 21, no. 5, 2001, pp. 22-33.
7. R.M. Davis, "The Data Encryption Standard in Prospective," IEEE Comm. Magazine, vol. 16, no. 6, 1978, pp. 5-9.
8. E.T. Lin and E.J. Delp, "A Review of Fragile Image Watermarks," Proc. Multimedia and Security Workshop (ACM Multimedia), ACM Press, 1999, pp. 25-29.
9. W. Stallings Cryptography and Network Security: Principles and Practice, 4th ed., Prentice Hall Int'l, 2005.
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool