References
- B. Javidi and J. L. Horner, "Optical pattern recognition for validation and security verification," Optical Engineering, vol. 33, pp. 1752-1756, 1994 https://doi.org/10.1117/12.170736
- B. Javidi, G. S. Zhang, and J. Li, "Experimental demonstration of the random phase encoding technique for image encryption and security verification," Optical Engineering, vol. 35, pp. 2506-2512, 1996 https://doi.org/10.1117/1.600854
- B. Javidi and E. Ahouzi, "Optical security system with Fourier plane encoding," Optical Engineering, vol. 37, pp. 6247-6255, 1998 https://doi.org/10.1117/1.601645
- R. K. Wang, I. A. Watson, and C. Chatwin, “Random phase encoding for optical security,” Optical Engineering, vol. 35, pp. 2464-2469, 1996 https://doi.org/10.1117/1.600849
- N. F. Johnson, Z. Duric, and S. Jajodia, "Information Hiding- Steganography and Watermarking Attacks and Countermeasures," Kluwer Academic Publishers, pp. 18-44, 2001
- M. Niimi, H. Noda, and E. Kawaguchi, "Steganography Based on Region Segmentation with a Complexity Measure," Systems and Computers in Japan, vol. 30, issue. 3, pp. 1132-1140, 1999
- H. Wang and S. Wang, "Cyber warfare: Steganography vs steganalysis," Communications of the ACM, vol. 47, no. 10, 2004 https://doi.org/10.1145/1022594.1022597
- G. K. Wallace, "The jpeg still picture compression standard," Communications of the ACM, vol. 34, issue. 4, pp. 30-44, 1991 https://doi.org/10.1145/103085.103089
- K. Sherif and J. Bahram, "Information hiding technique with double phase encoding," Appl. Opt., vol. 41, no. 26, pp. 5462-5470, 2002 https://doi.org/10.1364/AO.41.005462
- R. Philippe and J. Bahram, "Optical image encryption using input plane and Fourier plane random encoding," Proceeding of SPIE, Vol. 2565, pp. 767-769, 1995
- T. Nomura and B. Javidi, "Information security using digital holography," Opt. Lett., vol. 25, no. 1, pp. 28-30, 2000 https://doi.org/10.1364/OL.25.000028
- X. Zhou, L. Chen, and J. Shao, "Investigation of digital hologram watermarking with double binary phase encoding," Optical Engineering, vol. 44, 2005
- R. W. Gerchberg and W. O. Saxton, "A practical algorithm for the determination of phase from image and diffraction plane pictures," Optik, vol. 35, pp. 237-246, 1972
- E. Kawaguchi and R.. Taniguchi, "Complexity of binary pictures and image thresholding – An application of DF-Expression to the thresholding problem", Proceedings of 8th International Conference on Pattern Recognition, vol. 2, pp. 1221-1225, 1986
- E. Kawaguchi and R.. Taniguchi, "The DF-Expression as an image thresholding strategy", IEEE Transactions on Systems, Man and Cybernetics, vol. 19, no. 5, pp. 1321-1328, 1989 https://doi.org/10.1109/21.44055
- E. Kawaguchi and R.. Taniguchi, "Depth-First Coding for multi-valued figures using bit-plane decomposition", IEEE Transactions on Communications, vol. 43, no. 5, pp. 1961-1995 https://doi.org/10.1109/26.387407
- J. Fridrich, "A New Steganographic Method for Palette Based Images," Proceeding of the IS&T PICS conference, pp. 285-289, 1988
- L. M. Marvel, C. G. Boncelet, Jr., and C. T. Retter, "Spread Spectrum Image Steganography,"IEEE Transactions on Image Processing, vol. 8, no. 8, pp. 1075-1083, 1999 https://doi.org/10.1109/83.777088
- M. Niimi, H. Noda, and E. Kawaguchi, "An Image Embedding in Image Complexity based Region Segmentation Method," Proceeding of International Conference on Image Processing, vol. 3, pp. 77-77, 1977
- N. F. Johnson, Z. Duric, and S. Jajodia, "Information Hiding Steganography and Watermarking Attacks and Countermeasures," Kluwer Academic Publishers, pp.18-44, 2001
- A. Westfeld and A. Pfitzmann, "Attacks on Steganographic systems," Lecture Notes in Computer Science, vol. 1768, Springer-Verlag, pp. 61-75, 2000 https://doi.org/10.1007/10719724_5
- Sin-Joo Lee, Jae-Min Bae, and Sung-Hwan Jung, "High Capacity Image Steganography using Complexity Measure," Proceeding of East-Asia Language Processing and Internet Information Technology, pp. 349-352, 2002
- http://funet.fi/pub/crypt/steganography/jpeg-jsteg-v4.diff.gz